May 8 00:52:13.727552 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 8 00:52:13.727572 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed May 7 23:24:31 -00 2025 May 8 00:52:13.727581 kernel: efi: EFI v2.70 by EDK II May 8 00:52:13.727586 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 8 00:52:13.727592 kernel: random: crng init done May 8 00:52:13.727597 kernel: ACPI: Early table checksum verification disabled May 8 00:52:13.727604 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 8 00:52:13.727616 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 8 00:52:13.727622 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727628 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727634 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727640 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727647 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727655 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727668 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727677 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727685 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:13.727691 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 8 00:52:13.727697 kernel: NUMA: Failed to initialise from firmware May 8 00:52:13.727704 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:13.727710 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 8 00:52:13.727716 kernel: Zone ranges: May 8 00:52:13.727722 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:13.727730 kernel: DMA32 empty May 8 00:52:13.727737 kernel: Normal empty May 8 00:52:13.727743 kernel: Movable zone start for each node May 8 00:52:13.727749 kernel: Early memory node ranges May 8 00:52:13.727755 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 8 00:52:13.727762 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 8 00:52:13.727769 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 8 00:52:13.727775 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 8 00:52:13.727781 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 8 00:52:13.727787 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 8 00:52:13.727793 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 8 00:52:13.727799 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:13.727806 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 8 00:52:13.727812 kernel: psci: probing for conduit method from ACPI. May 8 00:52:13.727819 kernel: psci: PSCIv1.1 detected in firmware. May 8 00:52:13.727825 kernel: psci: Using standard PSCI v0.2 function IDs May 8 00:52:13.727831 kernel: psci: Trusted OS migration not required May 8 00:52:13.727839 kernel: psci: SMC Calling Convention v1.1 May 8 00:52:13.727846 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 8 00:52:13.727854 kernel: ACPI: SRAT not present May 8 00:52:13.727861 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 8 00:52:13.727867 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 8 00:52:13.727874 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 8 00:52:13.727881 kernel: Detected PIPT I-cache on CPU0 May 8 00:52:13.727888 kernel: CPU features: detected: GIC system register CPU interface May 8 00:52:13.727896 kernel: CPU features: detected: Hardware dirty bit management May 8 00:52:13.727903 kernel: CPU features: detected: Spectre-v4 May 8 00:52:13.727911 kernel: CPU features: detected: Spectre-BHB May 8 00:52:13.727919 kernel: CPU features: kernel page table isolation forced ON by KASLR May 8 00:52:13.727934 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 8 00:52:13.727940 kernel: CPU features: detected: ARM erratum 1418040 May 8 00:52:13.727947 kernel: CPU features: detected: SSBS not fully self-synchronizing May 8 00:52:13.727953 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 8 00:52:13.727960 kernel: Policy zone: DMA May 8 00:52:13.727967 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:52:13.727976 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:52:13.727983 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:52:13.727990 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:52:13.727996 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:52:13.728005 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) May 8 00:52:13.728012 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:52:13.728019 kernel: trace event string verifier disabled May 8 00:52:13.728025 kernel: rcu: Preemptible hierarchical RCU implementation. May 8 00:52:13.728032 kernel: rcu: RCU event tracing is enabled. May 8 00:52:13.728039 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:52:13.728045 kernel: Trampoline variant of Tasks RCU enabled. May 8 00:52:13.728054 kernel: Tracing variant of Tasks RCU enabled. May 8 00:52:13.728069 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:52:13.728075 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:52:13.728082 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 8 00:52:13.728090 kernel: GICv3: 256 SPIs implemented May 8 00:52:13.728097 kernel: GICv3: 0 Extended SPIs implemented May 8 00:52:13.728108 kernel: GICv3: Distributor has no Range Selector support May 8 00:52:13.728115 kernel: Root IRQ handler: gic_handle_irq May 8 00:52:13.728121 kernel: GICv3: 16 PPIs implemented May 8 00:52:13.728128 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 8 00:52:13.728134 kernel: ACPI: SRAT not present May 8 00:52:13.728142 kernel: ITS [mem 0x08080000-0x0809ffff] May 8 00:52:13.728149 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 8 00:52:13.728155 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 8 00:52:13.728162 kernel: GICv3: using LPI property table @0x00000000400d0000 May 8 00:52:13.728168 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 8 00:52:13.728176 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:13.728183 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 8 00:52:13.728201 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 8 00:52:13.728208 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 8 00:52:13.728214 kernel: arm-pv: using stolen time PV May 8 00:52:13.728221 kernel: Console: colour dummy device 80x25 May 8 00:52:13.728227 kernel: ACPI: Core revision 20210730 May 8 00:52:13.728235 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 8 00:52:13.728243 kernel: pid_max: default: 32768 minimum: 301 May 8 00:52:13.728249 kernel: LSM: Security Framework initializing May 8 00:52:13.728257 kernel: SELinux: Initializing. May 8 00:52:13.728270 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:13.728276 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:13.728283 kernel: rcu: Hierarchical SRCU implementation. May 8 00:52:13.728290 kernel: Platform MSI: ITS@0x8080000 domain created May 8 00:52:13.728296 kernel: PCI/MSI: ITS@0x8080000 domain created May 8 00:52:13.728303 kernel: Remapping and enabling EFI services. May 8 00:52:13.728316 kernel: smp: Bringing up secondary CPUs ... May 8 00:52:13.728322 kernel: Detected PIPT I-cache on CPU1 May 8 00:52:13.728331 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 8 00:52:13.728338 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 8 00:52:13.728345 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:13.728352 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 8 00:52:13.728358 kernel: Detected PIPT I-cache on CPU2 May 8 00:52:13.728367 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 8 00:52:13.728374 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 8 00:52:13.728381 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:13.728387 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 8 00:52:13.728393 kernel: Detected PIPT I-cache on CPU3 May 8 00:52:13.728401 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 8 00:52:13.728408 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 8 00:52:13.728415 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:13.728422 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 8 00:52:13.728438 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:52:13.728451 kernel: SMP: Total of 4 processors activated. May 8 00:52:13.728457 kernel: CPU features: detected: 32-bit EL0 Support May 8 00:52:13.728465 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 8 00:52:13.728472 kernel: CPU features: detected: Common not Private translations May 8 00:52:13.728479 kernel: CPU features: detected: CRC32 instructions May 8 00:52:13.728486 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 8 00:52:13.728493 kernel: CPU features: detected: LSE atomic instructions May 8 00:52:13.728502 kernel: CPU features: detected: Privileged Access Never May 8 00:52:13.728509 kernel: CPU features: detected: RAS Extension Support May 8 00:52:13.728517 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 8 00:52:13.728524 kernel: CPU: All CPU(s) started at EL1 May 8 00:52:13.728531 kernel: alternatives: patching kernel code May 8 00:52:13.728539 kernel: devtmpfs: initialized May 8 00:52:13.728546 kernel: KASLR enabled May 8 00:52:13.728553 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:52:13.728560 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:52:13.728567 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:52:13.728574 kernel: SMBIOS 3.0.0 present. May 8 00:52:13.728581 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 8 00:52:13.728588 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:52:13.728598 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 8 00:52:13.728610 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 8 00:52:13.728617 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 8 00:52:13.728624 kernel: audit: initializing netlink subsys (disabled) May 8 00:52:13.728631 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 May 8 00:52:13.728638 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:52:13.728645 kernel: cpuidle: using governor menu May 8 00:52:13.728652 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 8 00:52:13.728659 kernel: ASID allocator initialised with 32768 entries May 8 00:52:13.728666 kernel: ACPI: bus type PCI registered May 8 00:52:13.728674 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:52:13.728681 kernel: Serial: AMBA PL011 UART driver May 8 00:52:13.728688 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:52:13.728695 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 8 00:52:13.728702 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:52:13.728709 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 8 00:52:13.728716 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:52:13.728723 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 8 00:52:13.728730 kernel: ACPI: Added _OSI(Module Device) May 8 00:52:13.728738 kernel: ACPI: Added _OSI(Processor Device) May 8 00:52:13.728745 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:52:13.728752 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:52:13.728759 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:52:13.728766 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:52:13.728773 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:52:13.728779 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:52:13.728786 kernel: ACPI: Interpreter enabled May 8 00:52:13.728793 kernel: ACPI: Using GIC for interrupt routing May 8 00:52:13.728804 kernel: ACPI: MCFG table detected, 1 entries May 8 00:52:13.728814 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 8 00:52:13.728824 kernel: printk: console [ttyAMA0] enabled May 8 00:52:13.728833 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:52:13.728968 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:52:13.729046 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 8 00:52:13.729111 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 8 00:52:13.729177 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 8 00:52:13.729239 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 8 00:52:13.729248 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 8 00:52:13.729255 kernel: PCI host bridge to bus 0000:00 May 8 00:52:13.729354 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 8 00:52:13.729412 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 8 00:52:13.729480 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 8 00:52:13.729536 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:52:13.729616 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 8 00:52:13.729693 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:52:13.729758 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 8 00:52:13.729822 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 8 00:52:13.729886 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:52:13.729969 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:52:13.730039 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 8 00:52:13.730104 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 8 00:52:13.730162 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 8 00:52:13.730219 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 8 00:52:13.730282 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 8 00:52:13.730292 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 8 00:52:13.730299 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 8 00:52:13.730306 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 8 00:52:13.730315 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 8 00:52:13.730322 kernel: iommu: Default domain type: Translated May 8 00:52:13.730329 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 8 00:52:13.730336 kernel: vgaarb: loaded May 8 00:52:13.730343 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:52:13.730350 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:52:13.730356 kernel: PTP clock support registered May 8 00:52:13.730363 kernel: Registered efivars operations May 8 00:52:13.730370 kernel: clocksource: Switched to clocksource arch_sys_counter May 8 00:52:13.730378 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:52:13.730385 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:52:13.730391 kernel: pnp: PnP ACPI init May 8 00:52:13.730459 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 8 00:52:13.730469 kernel: pnp: PnP ACPI: found 1 devices May 8 00:52:13.730476 kernel: NET: Registered PF_INET protocol family May 8 00:52:13.730483 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:52:13.730490 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:52:13.730504 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:52:13.730511 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:52:13.730519 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:52:13.730528 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:52:13.730535 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:13.730543 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:13.730550 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:52:13.730557 kernel: PCI: CLS 0 bytes, default 64 May 8 00:52:13.730564 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 8 00:52:13.730573 kernel: kvm [1]: HYP mode not available May 8 00:52:13.730580 kernel: Initialise system trusted keyrings May 8 00:52:13.730586 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:52:13.730593 kernel: Key type asymmetric registered May 8 00:52:13.730600 kernel: Asymmetric key parser 'x509' registered May 8 00:52:13.730607 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:52:13.730614 kernel: io scheduler mq-deadline registered May 8 00:52:13.730621 kernel: io scheduler kyber registered May 8 00:52:13.730627 kernel: io scheduler bfq registered May 8 00:52:13.730635 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 8 00:52:13.730642 kernel: ACPI: button: Power Button [PWRB] May 8 00:52:13.730649 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 8 00:52:13.730718 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 8 00:52:13.730728 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:52:13.730735 kernel: thunder_xcv, ver 1.0 May 8 00:52:13.730743 kernel: thunder_bgx, ver 1.0 May 8 00:52:13.730749 kernel: nicpf, ver 1.0 May 8 00:52:13.730756 kernel: nicvf, ver 1.0 May 8 00:52:13.730834 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 8 00:52:13.730909 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-08T00:52:13 UTC (1746665533) May 8 00:52:13.730919 kernel: hid: raw HID events driver (C) Jiri Kosina May 8 00:52:13.730967 kernel: NET: Registered PF_INET6 protocol family May 8 00:52:13.730974 kernel: Segment Routing with IPv6 May 8 00:52:13.730982 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:52:13.730989 kernel: NET: Registered PF_PACKET protocol family May 8 00:52:13.730996 kernel: Key type dns_resolver registered May 8 00:52:13.731007 kernel: registered taskstats version 1 May 8 00:52:13.731015 kernel: Loading compiled-in X.509 certificates May 8 00:52:13.731023 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: 47302b466ab2df930dd804d2ee9c8ab44de4e2dc' May 8 00:52:13.731030 kernel: Key type .fscrypt registered May 8 00:52:13.731037 kernel: Key type fscrypt-provisioning registered May 8 00:52:13.731044 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:52:13.731051 kernel: ima: Allocated hash algorithm: sha1 May 8 00:52:13.731058 kernel: ima: No architecture policies found May 8 00:52:13.731065 kernel: clk: Disabling unused clocks May 8 00:52:13.731073 kernel: Freeing unused kernel memory: 36416K May 8 00:52:13.731081 kernel: Run /init as init process May 8 00:52:13.731087 kernel: with arguments: May 8 00:52:13.731094 kernel: /init May 8 00:52:13.731101 kernel: with environment: May 8 00:52:13.731108 kernel: HOME=/ May 8 00:52:13.731115 kernel: TERM=linux May 8 00:52:13.731122 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:52:13.731131 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:13.731141 systemd[1]: Detected virtualization kvm. May 8 00:52:13.731149 systemd[1]: Detected architecture arm64. May 8 00:52:13.731156 systemd[1]: Running in initrd. May 8 00:52:13.731163 systemd[1]: No hostname configured, using default hostname. May 8 00:52:13.731171 systemd[1]: Hostname set to . May 8 00:52:13.731179 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:13.731186 systemd[1]: Queued start job for default target initrd.target. May 8 00:52:13.731195 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:13.731202 systemd[1]: Reached target cryptsetup.target. May 8 00:52:13.731209 systemd[1]: Reached target paths.target. May 8 00:52:13.731217 systemd[1]: Reached target slices.target. May 8 00:52:13.731224 systemd[1]: Reached target swap.target. May 8 00:52:13.731231 systemd[1]: Reached target timers.target. May 8 00:52:13.731239 systemd[1]: Listening on iscsid.socket. May 8 00:52:13.731248 systemd[1]: Listening on iscsiuio.socket. May 8 00:52:13.731256 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:52:13.731271 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:52:13.731279 systemd[1]: Listening on systemd-journald.socket. May 8 00:52:13.731286 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:13.731294 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:13.731302 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:13.731313 systemd[1]: Reached target sockets.target. May 8 00:52:13.731321 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:13.731331 systemd[1]: Finished network-cleanup.service. May 8 00:52:13.731338 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:52:13.731346 systemd[1]: Starting systemd-journald.service... May 8 00:52:13.731353 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:13.731361 systemd[1]: Starting systemd-resolved.service... May 8 00:52:13.731368 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:52:13.731376 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:13.731383 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:52:13.731391 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:52:13.731399 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:52:13.731410 systemd-journald[289]: Journal started May 8 00:52:13.731452 systemd-journald[289]: Runtime Journal (/run/log/journal/dd6ce088c9cb4e8abe83eef37d0a355f) is 6.0M, max 48.7M, 42.6M free. May 8 00:52:13.728574 systemd-modules-load[290]: Inserted module 'overlay' May 8 00:52:13.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.736938 kernel: audit: type=1130 audit(1746665533.733:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.736969 systemd[1]: Started systemd-journald.service. May 8 00:52:13.741106 kernel: audit: type=1130 audit(1746665533.737:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.738738 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:52:13.742279 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:52:13.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.748539 kernel: audit: type=1130 audit(1746665533.743:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.755046 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:52:13.757014 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:52:13.761784 kernel: audit: type=1130 audit(1746665533.756:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.761814 kernel: Bridge firewalling registered May 8 00:52:13.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.757655 systemd-resolved[291]: Positive Trust Anchors: May 8 00:52:13.757662 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:13.757690 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:13.758590 systemd[1]: Starting dracut-cmdline.service... May 8 00:52:13.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.761303 systemd-modules-load[290]: Inserted module 'br_netfilter' May 8 00:52:13.778053 kernel: audit: type=1130 audit(1746665533.770:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.778074 kernel: SCSI subsystem initialized May 8 00:52:13.766401 systemd-resolved[291]: Defaulting to hostname 'linux'. May 8 00:52:13.767140 systemd[1]: Started systemd-resolved.service. May 8 00:52:13.771893 systemd[1]: Reached target nss-lookup.target. May 8 00:52:13.780839 dracut-cmdline[308]: dracut-dracut-053 May 8 00:52:13.781733 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:52:13.788467 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:52:13.788496 kernel: device-mapper: uevent: version 1.0.3 May 8 00:52:13.788509 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:52:13.791174 systemd-modules-load[290]: Inserted module 'dm_multipath' May 8 00:52:13.791974 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:13.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.793946 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:13.797506 kernel: audit: type=1130 audit(1746665533.793:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.803395 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:13.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.808185 kernel: audit: type=1130 audit(1746665533.804:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.849944 kernel: Loading iSCSI transport class v2.0-870. May 8 00:52:13.864078 kernel: iscsi: registered transport (tcp) May 8 00:52:13.879016 kernel: iscsi: registered transport (qla4xxx) May 8 00:52:13.879076 kernel: QLogic iSCSI HBA Driver May 8 00:52:13.913648 systemd[1]: Finished dracut-cmdline.service. May 8 00:52:13.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.915361 systemd[1]: Starting dracut-pre-udev.service... May 8 00:52:13.918692 kernel: audit: type=1130 audit(1746665533.913:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.962958 kernel: raid6: neonx8 gen() 13647 MB/s May 8 00:52:13.979945 kernel: raid6: neonx8 xor() 10708 MB/s May 8 00:52:13.996953 kernel: raid6: neonx4 gen() 13432 MB/s May 8 00:52:14.013947 kernel: raid6: neonx4 xor() 11121 MB/s May 8 00:52:14.030944 kernel: raid6: neonx2 gen() 12848 MB/s May 8 00:52:14.047940 kernel: raid6: neonx2 xor() 10370 MB/s May 8 00:52:14.064947 kernel: raid6: neonx1 gen() 10454 MB/s May 8 00:52:14.081945 kernel: raid6: neonx1 xor() 8711 MB/s May 8 00:52:14.098945 kernel: raid6: int64x8 gen() 6253 MB/s May 8 00:52:14.115953 kernel: raid6: int64x8 xor() 3531 MB/s May 8 00:52:14.132954 kernel: raid6: int64x4 gen() 7170 MB/s May 8 00:52:14.149941 kernel: raid6: int64x4 xor() 3833 MB/s May 8 00:52:14.166952 kernel: raid6: int64x2 gen() 6118 MB/s May 8 00:52:14.183944 kernel: raid6: int64x2 xor() 3290 MB/s May 8 00:52:14.200953 kernel: raid6: int64x1 gen() 4998 MB/s May 8 00:52:14.218018 kernel: raid6: int64x1 xor() 2623 MB/s May 8 00:52:14.218030 kernel: raid6: using algorithm neonx8 gen() 13647 MB/s May 8 00:52:14.218039 kernel: raid6: .... xor() 10708 MB/s, rmw enabled May 8 00:52:14.219091 kernel: raid6: using neon recovery algorithm May 8 00:52:14.230329 kernel: xor: measuring software checksum speed May 8 00:52:14.230342 kernel: 8regs : 17235 MB/sec May 8 00:52:14.230351 kernel: 32regs : 20292 MB/sec May 8 00:52:14.230942 kernel: arm64_neon : 27579 MB/sec May 8 00:52:14.230953 kernel: xor: using function: arm64_neon (27579 MB/sec) May 8 00:52:14.288945 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 8 00:52:14.299553 systemd[1]: Finished dracut-pre-udev.service. May 8 00:52:14.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.302000 audit: BPF prog-id=7 op=LOAD May 8 00:52:14.302000 audit: BPF prog-id=8 op=LOAD May 8 00:52:14.303754 systemd[1]: Starting systemd-udevd.service... May 8 00:52:14.305123 kernel: audit: type=1130 audit(1746665534.300:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.320949 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 8 00:52:14.324311 systemd[1]: Started systemd-udevd.service. May 8 00:52:14.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.326151 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:52:14.337268 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 8 00:52:14.364346 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:52:14.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.366020 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:14.401346 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:14.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.430332 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:52:14.436758 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:52:14.436773 kernel: GPT:9289727 != 19775487 May 8 00:52:14.436782 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:52:14.436791 kernel: GPT:9289727 != 19775487 May 8 00:52:14.436800 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:52:14.436814 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:14.451040 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:52:14.452033 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:52:14.458253 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:52:14.460172 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (546) May 8 00:52:14.461870 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:52:14.467882 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:14.469587 systemd[1]: Starting disk-uuid.service... May 8 00:52:14.475726 disk-uuid[566]: Primary Header is updated. May 8 00:52:14.475726 disk-uuid[566]: Secondary Entries is updated. May 8 00:52:14.475726 disk-uuid[566]: Secondary Header is updated. May 8 00:52:14.478949 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:15.496881 disk-uuid[567]: The operation has completed successfully. May 8 00:52:15.498099 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:15.515993 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:52:15.517121 systemd[1]: Finished disk-uuid.service. May 8 00:52:15.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.521811 systemd[1]: Starting verity-setup.service... May 8 00:52:15.539955 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 8 00:52:15.560333 systemd[1]: Found device dev-mapper-usr.device. May 8 00:52:15.562085 systemd[1]: Finished verity-setup.service. May 8 00:52:15.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.564295 systemd[1]: Mounting sysusr-usr.mount... May 8 00:52:15.612948 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:52:15.613569 systemd[1]: Mounted sysusr-usr.mount. May 8 00:52:15.615107 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:52:15.616668 systemd[1]: Starting ignition-setup.service... May 8 00:52:15.618009 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:52:15.625068 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:52:15.625104 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:15.625116 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:15.633399 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:52:15.638651 systemd[1]: Finished ignition-setup.service. May 8 00:52:15.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.640170 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:52:15.701560 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:52:15.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.702000 audit: BPF prog-id=9 op=LOAD May 8 00:52:15.703957 systemd[1]: Starting systemd-networkd.service... May 8 00:52:15.739308 systemd-networkd[740]: lo: Link UP May 8 00:52:15.739319 systemd-networkd[740]: lo: Gained carrier May 8 00:52:15.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.739723 systemd-networkd[740]: Enumeration completed May 8 00:52:15.739815 systemd[1]: Started systemd-networkd.service. May 8 00:52:15.739936 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:15.741221 systemd-networkd[740]: eth0: Link UP May 8 00:52:15.741224 systemd-networkd[740]: eth0: Gained carrier May 8 00:52:15.741368 systemd[1]: Reached target network.target. May 8 00:52:15.743622 systemd[1]: Starting iscsiuio.service... May 8 00:52:15.755546 systemd[1]: Started iscsiuio.service. May 8 00:52:15.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.757897 systemd[1]: Starting iscsid.service... May 8 00:52:15.760999 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.132/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:15.762672 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:15.762672 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:52:15.762672 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:52:15.762672 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:52:15.762672 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:15.762672 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:52:15.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.762119 ignition[651]: Ignition 2.14.0 May 8 00:52:15.765290 systemd[1]: Started iscsid.service. May 8 00:52:15.762126 ignition[651]: Stage: fetch-offline May 8 00:52:15.771645 systemd[1]: Starting dracut-initqueue.service... May 8 00:52:15.762166 ignition[651]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.762175 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.762317 ignition[651]: parsed url from cmdline: "" May 8 00:52:15.781566 systemd[1]: Finished dracut-initqueue.service. May 8 00:52:15.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.762320 ignition[651]: no config URL provided May 8 00:52:15.782787 systemd[1]: Reached target remote-fs-pre.target. May 8 00:52:15.762325 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:52:15.784226 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:15.762333 ignition[651]: no config at "/usr/lib/ignition/user.ign" May 8 00:52:15.785537 systemd[1]: Reached target remote-fs.target. May 8 00:52:15.762350 ignition[651]: op(1): [started] loading QEMU firmware config module May 8 00:52:15.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.787583 systemd[1]: Starting dracut-pre-mount.service... May 8 00:52:15.762355 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:52:15.788976 unknown[651]: fetched base config from "system" May 8 00:52:15.766516 ignition[651]: op(1): [finished] loading QEMU firmware config module May 8 00:52:15.788983 unknown[651]: fetched user config from "qemu" May 8 00:52:15.782785 ignition[651]: parsing config with SHA512: e5f8396518ce5140c4e7c1efde804c2e5cf5a154c95a3f764d7127ac4cfa871528904edf4da3a32880fa98fe39e0015d33e00c467f66eb09a7526f3db5402fb1 May 8 00:52:15.790591 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:52:15.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.789280 ignition[651]: fetch-offline: fetch-offline passed May 8 00:52:15.791592 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:52:15.789335 ignition[651]: Ignition finished successfully May 8 00:52:15.792247 systemd[1]: Starting ignition-kargs.service... May 8 00:52:15.795714 systemd[1]: Finished dracut-pre-mount.service. May 8 00:52:15.800664 ignition[759]: Ignition 2.14.0 May 8 00:52:15.800669 ignition[759]: Stage: kargs May 8 00:52:15.802793 systemd[1]: Finished ignition-kargs.service. May 8 00:52:15.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.800749 ignition[759]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.800758 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.804624 systemd[1]: Starting ignition-disks.service... May 8 00:52:15.801697 ignition[759]: kargs: kargs passed May 8 00:52:15.801736 ignition[759]: Ignition finished successfully May 8 00:52:15.811079 ignition[768]: Ignition 2.14.0 May 8 00:52:15.811095 ignition[768]: Stage: disks May 8 00:52:15.811176 ignition[768]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.811185 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.812891 systemd[1]: Finished ignition-disks.service. May 8 00:52:15.812142 ignition[768]: disks: disks passed May 8 00:52:15.813947 systemd[1]: Reached target initrd-root-device.target. May 8 00:52:15.812184 ignition[768]: Ignition finished successfully May 8 00:52:15.815490 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:15.816764 systemd[1]: Reached target local-fs.target. May 8 00:52:15.817899 systemd[1]: Reached target sysinit.target. May 8 00:52:15.819231 systemd[1]: Reached target basic.target. May 8 00:52:15.821214 systemd[1]: Starting systemd-fsck-root.service... May 8 00:52:15.831778 systemd-fsck[776]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 8 00:52:15.834871 systemd[1]: Finished systemd-fsck-root.service. May 8 00:52:15.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.836507 systemd[1]: Mounting sysroot.mount... May 8 00:52:15.841941 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:52:15.842442 systemd[1]: Mounted sysroot.mount. May 8 00:52:15.843151 systemd[1]: Reached target initrd-root-fs.target. May 8 00:52:15.845426 systemd[1]: Mounting sysroot-usr.mount... May 8 00:52:15.846297 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:52:15.846335 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:52:15.846358 systemd[1]: Reached target ignition-diskful.target. May 8 00:52:15.848109 systemd[1]: Mounted sysroot-usr.mount. May 8 00:52:15.849879 systemd[1]: Starting initrd-setup-root.service... May 8 00:52:15.854035 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:52:15.858680 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory May 8 00:52:15.861436 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:52:15.865641 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:52:15.890153 systemd[1]: Finished initrd-setup-root.service. May 8 00:52:15.891619 systemd[1]: Starting ignition-mount.service... May 8 00:52:15.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.892883 systemd[1]: Starting sysroot-boot.service... May 8 00:52:15.896863 bash[827]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:52:15.905727 ignition[829]: INFO : Ignition 2.14.0 May 8 00:52:15.905727 ignition[829]: INFO : Stage: mount May 8 00:52:15.907334 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.907334 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.907334 ignition[829]: INFO : mount: mount passed May 8 00:52:15.907334 ignition[829]: INFO : Ignition finished successfully May 8 00:52:15.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.907512 systemd[1]: Finished ignition-mount.service. May 8 00:52:15.911804 systemd[1]: Finished sysroot-boot.service. May 8 00:52:15.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.571961 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:52:16.578712 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) May 8 00:52:16.578741 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:52:16.580170 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:16.580183 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:16.582891 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:52:16.584397 systemd[1]: Starting ignition-files.service... May 8 00:52:16.597844 ignition[857]: INFO : Ignition 2.14.0 May 8 00:52:16.597844 ignition[857]: INFO : Stage: files May 8 00:52:16.599492 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:16.599492 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:16.599492 ignition[857]: DEBUG : files: compiled without relabeling support, skipping May 8 00:52:16.602713 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:52:16.602713 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:52:16.605663 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:52:16.606989 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:52:16.606989 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:52:16.606989 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 8 00:52:16.606452 unknown[857]: wrote ssh authorized keys file for user: core May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:52:16.613017 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 8 00:52:16.864367 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 8 00:52:17.108416 systemd-networkd[740]: eth0: Gained IPv6LL May 8 00:52:17.192603 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:52:17.192603 ignition[857]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 8 00:52:17.196330 ignition[857]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:17.196330 ignition[857]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:17.196330 ignition[857]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 8 00:52:17.196330 ignition[857]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:52:17.196330 ignition[857]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:17.230741 ignition[857]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:17.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.233402 systemd[1]: Finished ignition-files.service. May 8 00:52:17.236802 ignition[857]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:52:17.236802 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:17.236802 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:17.236802 ignition[857]: INFO : files: files passed May 8 00:52:17.236802 ignition[857]: INFO : Ignition finished successfully May 8 00:52:17.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.235054 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:52:17.235904 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:52:17.248497 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:52:17.236571 systemd[1]: Starting ignition-quench.service... May 8 00:52:17.250715 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:52:17.241010 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:52:17.241086 systemd[1]: Finished ignition-quench.service. May 8 00:52:17.242744 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:52:17.244090 systemd[1]: Reached target ignition-complete.target. May 8 00:52:17.246050 systemd[1]: Starting initrd-parse-etc.service... May 8 00:52:17.258190 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:52:17.258279 systemd[1]: Finished initrd-parse-etc.service. May 8 00:52:17.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.259890 systemd[1]: Reached target initrd-fs.target. May 8 00:52:17.261082 systemd[1]: Reached target initrd.target. May 8 00:52:17.262361 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:52:17.263058 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:52:17.273581 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:52:17.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.275221 systemd[1]: Starting initrd-cleanup.service... May 8 00:52:17.283172 systemd[1]: Stopped target nss-lookup.target. May 8 00:52:17.284069 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:52:17.285457 systemd[1]: Stopped target timers.target. May 8 00:52:17.286747 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:52:17.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.286852 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:52:17.288078 systemd[1]: Stopped target initrd.target. May 8 00:52:17.289418 systemd[1]: Stopped target basic.target. May 8 00:52:17.290675 systemd[1]: Stopped target ignition-complete.target. May 8 00:52:17.291996 systemd[1]: Stopped target ignition-diskful.target. May 8 00:52:17.293327 systemd[1]: Stopped target initrd-root-device.target. May 8 00:52:17.294764 systemd[1]: Stopped target remote-fs.target. May 8 00:52:17.296124 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:52:17.297500 systemd[1]: Stopped target sysinit.target. May 8 00:52:17.298713 systemd[1]: Stopped target local-fs.target. May 8 00:52:17.299976 systemd[1]: Stopped target local-fs-pre.target. May 8 00:52:17.301241 systemd[1]: Stopped target swap.target. May 8 00:52:17.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.302451 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:52:17.302561 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:52:17.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.303900 systemd[1]: Stopped target cryptsetup.target. May 8 00:52:17.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.305044 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:52:17.305143 systemd[1]: Stopped dracut-initqueue.service. May 8 00:52:17.306554 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:52:17.306645 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:52:17.307894 systemd[1]: Stopped target paths.target. May 8 00:52:17.309008 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:52:17.312958 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:52:17.313916 systemd[1]: Stopped target slices.target. May 8 00:52:17.315462 systemd[1]: Stopped target sockets.target. May 8 00:52:17.316750 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:52:17.316824 systemd[1]: Closed iscsid.socket. May 8 00:52:17.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.317891 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:52:17.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.317986 systemd[1]: Closed iscsiuio.socket. May 8 00:52:17.319056 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:52:17.319160 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:52:17.320597 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:52:17.320691 systemd[1]: Stopped ignition-files.service. May 8 00:52:17.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.322618 systemd[1]: Stopping ignition-mount.service... May 8 00:52:17.324363 systemd[1]: Stopping sysroot-boot.service... May 8 00:52:17.325267 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:52:17.331829 ignition[897]: INFO : Ignition 2.14.0 May 8 00:52:17.331829 ignition[897]: INFO : Stage: umount May 8 00:52:17.331829 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:17.331829 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:17.331829 ignition[897]: INFO : umount: umount passed May 8 00:52:17.331829 ignition[897]: INFO : Ignition finished successfully May 8 00:52:17.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.325397 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:52:17.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.326841 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:52:17.326943 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:52:17.331184 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:52:17.331270 systemd[1]: Finished initrd-cleanup.service. May 8 00:52:17.332842 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:52:17.332946 systemd[1]: Stopped ignition-mount.service. May 8 00:52:17.335803 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:52:17.336098 systemd[1]: Stopped target network.target. May 8 00:52:17.338325 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:52:17.338382 systemd[1]: Stopped ignition-disks.service. May 8 00:52:17.340048 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:52:17.340087 systemd[1]: Stopped ignition-kargs.service. May 8 00:52:17.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.341302 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:52:17.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.341340 systemd[1]: Stopped ignition-setup.service. May 8 00:52:17.342998 systemd[1]: Stopping systemd-networkd.service... May 8 00:52:17.344139 systemd[1]: Stopping systemd-resolved.service... May 8 00:52:17.353989 systemd-networkd[740]: eth0: DHCPv6 lease lost May 8 00:52:17.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.364000 audit: BPF prog-id=6 op=UNLOAD May 8 00:52:17.357076 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:52:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.357172 systemd[1]: Stopped systemd-resolved.service. May 8 00:52:17.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.370000 audit: BPF prog-id=9 op=UNLOAD May 8 00:52:17.358862 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:52:17.358957 systemd[1]: Stopped systemd-networkd.service. May 8 00:52:17.360010 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:52:17.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.360037 systemd[1]: Closed systemd-networkd.socket. May 8 00:52:17.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.361906 systemd[1]: Stopping network-cleanup.service... May 8 00:52:17.363435 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:52:17.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.363491 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:52:17.365023 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:52:17.365064 systemd[1]: Stopped systemd-sysctl.service. May 8 00:52:17.367334 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:52:17.367380 systemd[1]: Stopped systemd-modules-load.service. May 8 00:52:17.368277 systemd[1]: Stopping systemd-udevd.service... May 8 00:52:17.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.373411 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:52:17.373894 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:52:17.373978 systemd[1]: Stopped sysroot-boot.service. May 8 00:52:17.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.375387 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:52:17.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.375440 systemd[1]: Stopped initrd-setup-root.service. May 8 00:52:17.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.377275 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:52:17.377373 systemd[1]: Stopped network-cleanup.service. May 8 00:52:17.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.383336 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:52:17.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.383449 systemd[1]: Stopped systemd-udevd.service. May 8 00:52:17.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.384867 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:52:17.384899 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:52:17.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.386112 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:52:17.386146 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:52:17.387768 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:52:17.387810 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:52:17.389218 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:52:17.389258 systemd[1]: Stopped dracut-cmdline.service. May 8 00:52:17.390562 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:52:17.390600 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:52:17.392788 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:52:17.393579 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 8 00:52:17.393633 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 8 00:52:17.395788 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:52:17.395830 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:52:17.396679 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:52:17.396717 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:52:17.398906 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 8 00:52:17.399337 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:52:17.399412 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:52:17.400762 systemd[1]: Reached target initrd-switch-root.target. May 8 00:52:17.402752 systemd[1]: Starting initrd-switch-root.service... May 8 00:52:17.409163 systemd[1]: Switching root. May 8 00:52:17.427914 iscsid[746]: iscsid shutting down. May 8 00:52:17.428619 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). May 8 00:52:17.428666 systemd-journald[289]: Journal stopped May 8 00:52:19.430715 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:52:19.430769 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:52:19.430782 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:52:19.430793 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:52:19.430807 kernel: SELinux: policy capability open_perms=1 May 8 00:52:19.430820 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:52:19.430829 kernel: SELinux: policy capability always_check_network=0 May 8 00:52:19.430843 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:52:19.430853 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:52:19.430862 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:52:19.430872 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:52:19.430883 systemd[1]: Successfully loaded SELinux policy in 34.291ms. May 8 00:52:19.430902 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.343ms. May 8 00:52:19.430914 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:19.431003 systemd[1]: Detected virtualization kvm. May 8 00:52:19.431021 systemd[1]: Detected architecture arm64. May 8 00:52:19.431032 systemd[1]: Detected first boot. May 8 00:52:19.431043 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:19.431054 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:52:19.431067 systemd[1]: Populated /etc with preset unit settings. May 8 00:52:19.431079 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:19.431092 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:19.431104 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:19.431114 kernel: kauditd_printk_skb: 79 callbacks suppressed May 8 00:52:19.431124 kernel: audit: type=1334 audit(1746665539.257:83): prog-id=12 op=LOAD May 8 00:52:19.431133 kernel: audit: type=1334 audit(1746665539.257:84): prog-id=3 op=UNLOAD May 8 00:52:19.431143 kernel: audit: type=1334 audit(1746665539.258:85): prog-id=13 op=LOAD May 8 00:52:19.431154 kernel: audit: type=1334 audit(1746665539.258:86): prog-id=14 op=LOAD May 8 00:52:19.431163 kernel: audit: type=1334 audit(1746665539.258:87): prog-id=4 op=UNLOAD May 8 00:52:19.431173 kernel: audit: type=1334 audit(1746665539.258:88): prog-id=5 op=UNLOAD May 8 00:52:19.431184 kernel: audit: type=1334 audit(1746665539.260:89): prog-id=15 op=LOAD May 8 00:52:19.431193 kernel: audit: type=1334 audit(1746665539.260:90): prog-id=12 op=UNLOAD May 8 00:52:19.431203 kernel: audit: type=1334 audit(1746665539.261:91): prog-id=16 op=LOAD May 8 00:52:19.431212 kernel: audit: type=1334 audit(1746665539.262:92): prog-id=17 op=LOAD May 8 00:52:19.431225 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:52:19.431236 systemd[1]: Stopped iscsiuio.service. May 8 00:52:19.431246 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:52:19.431257 systemd[1]: Stopped iscsid.service. May 8 00:52:19.431267 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:52:19.431279 systemd[1]: Stopped initrd-switch-root.service. May 8 00:52:19.431290 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:52:19.431310 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:52:19.431321 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:52:19.431331 systemd[1]: Created slice system-getty.slice. May 8 00:52:19.431342 systemd[1]: Created slice system-modprobe.slice. May 8 00:52:19.431353 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:52:19.431364 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:52:19.431376 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:52:19.431386 systemd[1]: Created slice user.slice. May 8 00:52:19.431396 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:19.431407 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:52:19.431418 systemd[1]: Set up automount boot.automount. May 8 00:52:19.431428 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:52:19.431438 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:52:19.431450 systemd[1]: Stopped target initrd-fs.target. May 8 00:52:19.431461 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:52:19.431471 systemd[1]: Reached target integritysetup.target. May 8 00:52:19.431481 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:19.431492 systemd[1]: Reached target remote-fs.target. May 8 00:52:19.431503 systemd[1]: Reached target slices.target. May 8 00:52:19.431520 systemd[1]: Reached target swap.target. May 8 00:52:19.431532 systemd[1]: Reached target torcx.target. May 8 00:52:19.431544 systemd[1]: Reached target veritysetup.target. May 8 00:52:19.431556 systemd[1]: Listening on systemd-coredump.socket. May 8 00:52:19.431567 systemd[1]: Listening on systemd-initctl.socket. May 8 00:52:19.431577 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:19.431587 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:19.431598 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:19.431609 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:52:19.431619 systemd[1]: Mounting dev-hugepages.mount... May 8 00:52:19.431629 systemd[1]: Mounting dev-mqueue.mount... May 8 00:52:19.431640 systemd[1]: Mounting media.mount... May 8 00:52:19.431651 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:52:19.431661 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:52:19.431672 systemd[1]: Mounting tmp.mount... May 8 00:52:19.431682 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:52:19.431692 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:19.431702 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:19.431713 systemd[1]: Starting modprobe@configfs.service... May 8 00:52:19.431723 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:19.431735 systemd[1]: Starting modprobe@drm.service... May 8 00:52:19.431745 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:19.431756 systemd[1]: Starting modprobe@fuse.service... May 8 00:52:19.431766 systemd[1]: Starting modprobe@loop.service... May 8 00:52:19.431777 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:52:19.431787 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:52:19.431798 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:52:19.431809 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:52:19.431819 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:52:19.431831 systemd[1]: Stopped systemd-journald.service. May 8 00:52:19.431841 systemd[1]: Starting systemd-journald.service... May 8 00:52:19.431852 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:19.431863 systemd[1]: Starting systemd-network-generator.service... May 8 00:52:19.431874 systemd[1]: Starting systemd-remount-fs.service... May 8 00:52:19.431884 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:19.431894 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:52:19.431905 systemd[1]: Stopped verity-setup.service. May 8 00:52:19.431915 systemd[1]: Mounted dev-hugepages.mount. May 8 00:52:19.431931 systemd[1]: Mounted dev-mqueue.mount. May 8 00:52:19.431945 systemd[1]: Mounted media.mount. May 8 00:52:19.431955 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:52:19.431965 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:52:19.431976 systemd[1]: Mounted tmp.mount. May 8 00:52:19.431986 kernel: fuse: init (API version 7.34) May 8 00:52:19.431995 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:19.432006 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:52:19.432016 systemd[1]: Finished modprobe@configfs.service. May 8 00:52:19.432026 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:19.432038 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:19.432048 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:19.432060 systemd-journald[989]: Journal started May 8 00:52:19.432107 systemd-journald[989]: Runtime Journal (/run/log/journal/dd6ce088c9cb4e8abe83eef37d0a355f) is 6.0M, max 48.7M, 42.6M free. May 8 00:52:19.432138 systemd[1]: Finished modprobe@drm.service. May 8 00:52:19.432154 kernel: loop: module loaded May 8 00:52:17.489000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:52:17.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:17.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:17.555000 audit: BPF prog-id=10 op=LOAD May 8 00:52:17.555000 audit: BPF prog-id=10 op=UNLOAD May 8 00:52:17.555000 audit: BPF prog-id=11 op=LOAD May 8 00:52:17.555000 audit: BPF prog-id=11 op=UNLOAD May 8 00:52:17.592000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:52:17.592000 audit[931]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58b4 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:17.592000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:17.594000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:52:17.594000 audit[931]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5989 a2=1ed a3=0 items=2 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:17.594000 audit: CWD cwd="/" May 8 00:52:17.594000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:17.594000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:17.594000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:19.257000 audit: BPF prog-id=12 op=LOAD May 8 00:52:19.257000 audit: BPF prog-id=3 op=UNLOAD May 8 00:52:19.258000 audit: BPF prog-id=13 op=LOAD May 8 00:52:19.258000 audit: BPF prog-id=14 op=LOAD May 8 00:52:19.258000 audit: BPF prog-id=4 op=UNLOAD May 8 00:52:19.258000 audit: BPF prog-id=5 op=UNLOAD May 8 00:52:19.260000 audit: BPF prog-id=15 op=LOAD May 8 00:52:19.260000 audit: BPF prog-id=12 op=UNLOAD May 8 00:52:19.261000 audit: BPF prog-id=16 op=LOAD May 8 00:52:19.262000 audit: BPF prog-id=17 op=LOAD May 8 00:52:19.262000 audit: BPF prog-id=13 op=UNLOAD May 8 00:52:19.262000 audit: BPF prog-id=14 op=UNLOAD May 8 00:52:19.262000 audit: BPF prog-id=18 op=LOAD May 8 00:52:19.262000 audit: BPF prog-id=15 op=UNLOAD May 8 00:52:19.263000 audit: BPF prog-id=19 op=LOAD May 8 00:52:19.264000 audit: BPF prog-id=20 op=LOAD May 8 00:52:19.264000 audit: BPF prog-id=16 op=UNLOAD May 8 00:52:19.264000 audit: BPF prog-id=17 op=UNLOAD May 8 00:52:19.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.277000 audit: BPF prog-id=18 op=UNLOAD May 8 00:52:19.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.377000 audit: BPF prog-id=21 op=LOAD May 8 00:52:19.377000 audit: BPF prog-id=22 op=LOAD May 8 00:52:19.377000 audit: BPF prog-id=23 op=LOAD May 8 00:52:19.377000 audit: BPF prog-id=19 op=UNLOAD May 8 00:52:19.377000 audit: BPF prog-id=20 op=UNLOAD May 8 00:52:19.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.426000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:52:19.426000 audit[989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffcfc82740 a2=4000 a3=1 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.426000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:52:19.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.256839 systemd[1]: Queued start job for default target multi-user.target. May 8 00:52:17.591722 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:19.256851 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:52:17.591968 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:19.265673 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:52:19.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:17.591998 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:17.592027 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:52:17.592037 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:52:17.592063 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:52:17.592075 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:52:17.592306 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:52:17.592342 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:17.592354 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:17.593086 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:52:17.593127 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:52:17.593148 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:52:17.593188 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:52:17.593207 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:52:17.593220 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:52:19.018188 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:19.018455 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:19.018557 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:19.018717 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:19.018766 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:52:19.018818 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:52:19.435355 systemd[1]: Started systemd-journald.service. May 8 00:52:19.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.436114 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:19.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.436279 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:19.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.437336 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:52:19.437495 systemd[1]: Finished modprobe@fuse.service. May 8 00:52:19.438548 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:19.438702 systemd[1]: Finished modprobe@loop.service. May 8 00:52:19.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.441710 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:19.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.443082 systemd[1]: Finished systemd-network-generator.service. May 8 00:52:19.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.444233 systemd[1]: Finished systemd-remount-fs.service. May 8 00:52:19.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.445497 systemd[1]: Reached target network-pre.target. May 8 00:52:19.447442 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:52:19.449503 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:52:19.450219 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:52:19.452109 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:52:19.453911 systemd[1]: Starting systemd-journal-flush.service... May 8 00:52:19.454731 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:19.456791 systemd[1]: Starting systemd-random-seed.service... May 8 00:52:19.457665 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:19.460891 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:19.463763 systemd-journald[989]: Time spent on flushing to /var/log/journal/dd6ce088c9cb4e8abe83eef37d0a355f is 12.742ms for 982 entries. May 8 00:52:19.463763 systemd-journald[989]: System Journal (/var/log/journal/dd6ce088c9cb4e8abe83eef37d0a355f) is 8.0M, max 195.6M, 187.6M free. May 8 00:52:19.482936 systemd-journald[989]: Received client request to flush runtime journal. May 8 00:52:19.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.463714 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:52:19.465597 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:52:19.466675 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:52:19.467741 systemd[1]: Finished systemd-random-seed.service. May 8 00:52:19.468970 systemd[1]: Reached target first-boot-complete.target. May 8 00:52:19.471000 systemd[1]: Starting systemd-sysusers.service... May 8 00:52:19.474266 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:19.476251 systemd[1]: Starting systemd-udev-settle.service... May 8 00:52:19.483876 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:19.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.485085 systemd[1]: Finished systemd-journal-flush.service. May 8 00:52:19.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.487764 udevadm[1035]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:52:19.494209 systemd[1]: Finished systemd-sysusers.service. May 8 00:52:19.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.496060 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:52:19.513695 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:52:19.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.827388 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:52:19.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.829750 systemd[1]: Starting systemd-udevd.service... May 8 00:52:19.828000 audit: BPF prog-id=24 op=LOAD May 8 00:52:19.828000 audit: BPF prog-id=25 op=LOAD May 8 00:52:19.828000 audit: BPF prog-id=7 op=UNLOAD May 8 00:52:19.828000 audit: BPF prog-id=8 op=UNLOAD May 8 00:52:19.848759 systemd-udevd[1039]: Using default interface naming scheme 'v252'. May 8 00:52:19.861897 systemd[1]: Started systemd-udevd.service. May 8 00:52:19.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.862000 audit: BPF prog-id=26 op=LOAD May 8 00:52:19.866500 systemd[1]: Starting systemd-networkd.service... May 8 00:52:19.873725 systemd[1]: Starting systemd-userdbd.service... May 8 00:52:19.872000 audit: BPF prog-id=27 op=LOAD May 8 00:52:19.872000 audit: BPF prog-id=28 op=LOAD May 8 00:52:19.872000 audit: BPF prog-id=29 op=LOAD May 8 00:52:19.881386 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 8 00:52:19.911637 systemd[1]: Started systemd-userdbd.service. May 8 00:52:19.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.921691 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:19.965343 systemd-networkd[1052]: lo: Link UP May 8 00:52:19.965356 systemd-networkd[1052]: lo: Gained carrier May 8 00:52:19.965694 systemd-networkd[1052]: Enumeration completed May 8 00:52:19.965786 systemd[1]: Started systemd-networkd.service. May 8 00:52:19.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.966867 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:19.968104 systemd-networkd[1052]: eth0: Link UP May 8 00:52:19.968113 systemd-networkd[1052]: eth0: Gained carrier May 8 00:52:19.970366 systemd[1]: Finished systemd-udev-settle.service. May 8 00:52:19.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:19.972464 systemd[1]: Starting lvm2-activation-early.service... May 8 00:52:19.986014 lvm[1073]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:19.994086 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.132/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:20.010751 systemd[1]: Finished lvm2-activation-early.service. May 8 00:52:20.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.011831 systemd[1]: Reached target cryptsetup.target. May 8 00:52:20.013790 systemd[1]: Starting lvm2-activation.service... May 8 00:52:20.017394 lvm[1074]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:20.039727 systemd[1]: Finished lvm2-activation.service. May 8 00:52:20.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.040662 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:20.041511 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:52:20.041542 systemd[1]: Reached target local-fs.target. May 8 00:52:20.042312 systemd[1]: Reached target machines.target. May 8 00:52:20.044212 systemd[1]: Starting ldconfig.service... May 8 00:52:20.045289 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:20.045417 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.046669 systemd[1]: Starting systemd-boot-update.service... May 8 00:52:20.048762 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:52:20.050920 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:52:20.053477 systemd[1]: Starting systemd-sysext.service... May 8 00:52:20.054618 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1076 (bootctl) May 8 00:52:20.055736 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:52:20.066281 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:52:20.069249 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:52:20.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.074067 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:52:20.074269 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:52:20.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.121184 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:52:20.123965 kernel: loop0: detected capacity change from 0 to 194096 May 8 00:52:20.134951 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:52:20.150591 systemd-fsck[1085]: fsck.fat 4.2 (2021-01-31) May 8 00:52:20.150591 systemd-fsck[1085]: /dev/vda1: 236 files, 117182/258078 clusters May 8 00:52:20.152339 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:52:20.154539 kernel: loop1: detected capacity change from 0 to 194096 May 8 00:52:20.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.163541 (sd-sysext)[1089]: Using extensions 'kubernetes'. May 8 00:52:20.164399 (sd-sysext)[1089]: Merged extensions into '/usr'. May 8 00:52:20.182272 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:20.183610 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:20.185616 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:20.187810 systemd[1]: Starting modprobe@loop.service... May 8 00:52:20.188834 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:20.188974 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.189714 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:20.189838 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:20.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.191292 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:20.191421 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:20.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.192808 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:20.192916 systemd[1]: Finished modprobe@loop.service. May 8 00:52:20.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.194338 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:20.194436 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:20.225680 ldconfig[1075]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:52:20.228506 systemd[1]: Finished ldconfig.service. May 8 00:52:20.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.402954 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:52:20.405029 systemd[1]: Mounting boot.mount... May 8 00:52:20.406807 systemd[1]: Mounting usr-share-oem.mount... May 8 00:52:20.412747 systemd[1]: Mounted boot.mount. May 8 00:52:20.415140 systemd[1]: Mounted usr-share-oem.mount. May 8 00:52:20.417050 systemd[1]: Finished systemd-sysext.service. May 8 00:52:20.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.419343 systemd[1]: Starting ensure-sysext.service... May 8 00:52:20.421082 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:52:20.423829 systemd[1]: Finished systemd-boot-update.service. May 8 00:52:20.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.426337 systemd[1]: Reloading. May 8 00:52:20.430582 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:52:20.431340 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:52:20.432705 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:52:20.459591 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2025-05-08T00:52:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:20.459912 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2025-05-08T00:52:20Z" level=info msg="torcx already run" May 8 00:52:20.520455 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:20.520474 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:20.535711 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:20.575000 audit: BPF prog-id=30 op=LOAD May 8 00:52:20.575000 audit: BPF prog-id=21 op=UNLOAD May 8 00:52:20.575000 audit: BPF prog-id=31 op=LOAD May 8 00:52:20.575000 audit: BPF prog-id=32 op=LOAD May 8 00:52:20.575000 audit: BPF prog-id=22 op=UNLOAD May 8 00:52:20.575000 audit: BPF prog-id=23 op=UNLOAD May 8 00:52:20.577000 audit: BPF prog-id=33 op=LOAD May 8 00:52:20.577000 audit: BPF prog-id=26 op=UNLOAD May 8 00:52:20.578000 audit: BPF prog-id=34 op=LOAD May 8 00:52:20.578000 audit: BPF prog-id=27 op=UNLOAD May 8 00:52:20.578000 audit: BPF prog-id=35 op=LOAD May 8 00:52:20.578000 audit: BPF prog-id=36 op=LOAD May 8 00:52:20.578000 audit: BPF prog-id=28 op=UNLOAD May 8 00:52:20.578000 audit: BPF prog-id=29 op=UNLOAD May 8 00:52:20.579000 audit: BPF prog-id=37 op=LOAD May 8 00:52:20.579000 audit: BPF prog-id=38 op=LOAD May 8 00:52:20.579000 audit: BPF prog-id=24 op=UNLOAD May 8 00:52:20.579000 audit: BPF prog-id=25 op=UNLOAD May 8 00:52:20.581706 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:52:20.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.586160 systemd[1]: Starting audit-rules.service... May 8 00:52:20.588104 systemd[1]: Starting clean-ca-certificates.service... May 8 00:52:20.590635 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:52:20.593000 audit: BPF prog-id=39 op=LOAD May 8 00:52:20.595071 systemd[1]: Starting systemd-resolved.service... May 8 00:52:20.598000 audit: BPF prog-id=40 op=LOAD May 8 00:52:20.600252 systemd[1]: Starting systemd-timesyncd.service... May 8 00:52:20.602068 systemd[1]: Starting systemd-update-utmp.service... May 8 00:52:20.605452 systemd[1]: Finished clean-ca-certificates.service. May 8 00:52:20.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.606792 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:20.607000 audit[1166]: SYSTEM_BOOT pid=1166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:52:20.612139 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:20.613536 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:20.615522 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:20.617540 systemd[1]: Starting modprobe@loop.service... May 8 00:52:20.619507 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:20.619685 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.619831 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:20.621074 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:52:20.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.622641 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:20.622757 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:20.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.624161 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:20.624268 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:20.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.625909 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:20.626049 systemd[1]: Finished modprobe@loop.service. May 8 00:52:20.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.627478 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:20.627610 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:20.628833 systemd[1]: Starting systemd-update-done.service... May 8 00:52:20.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.630515 systemd[1]: Finished systemd-update-utmp.service. May 8 00:52:20.633721 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:20.634984 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:20.636985 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:20.639032 systemd[1]: Starting modprobe@loop.service... May 8 00:52:20.639786 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:20.639911 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.640059 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:20.640874 systemd[1]: Finished systemd-update-done.service. May 8 00:52:20.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:20.644000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:52:20.644000 audit[1183]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffed48fb00 a2=420 a3=0 items=0 ppid=1156 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:20.644000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:52:20.642385 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:20.645217 augenrules[1183]: No rules May 8 00:52:20.642523 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:20.643720 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:20.643826 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:20.645159 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:20.645266 systemd[1]: Finished modprobe@loop.service. May 8 00:52:20.646639 systemd[1]: Finished audit-rules.service. May 8 00:52:20.647883 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:20.648005 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:20.650138 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:20.651445 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:20.653335 systemd[1]: Starting modprobe@drm.service... May 8 00:52:20.655154 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:20.657059 systemd[1]: Starting modprobe@loop.service... May 8 00:52:20.657820 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:20.658011 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.659169 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:52:20.660256 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:20.661265 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:20.661416 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:20.662648 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:20.662765 systemd[1]: Finished modprobe@drm.service. May 8 00:52:20.664033 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:20.664147 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:20.665384 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:20.665511 systemd[1]: Finished modprobe@loop.service. May 8 00:52:20.666815 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:20.666905 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:20.670006 systemd[1]: Finished ensure-sysext.service. May 8 00:52:20.674803 systemd[1]: Started systemd-timesyncd.service. May 8 00:52:20.675658 systemd-timesyncd[1161]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:52:20.675958 systemd[1]: Reached target time-set.target. May 8 00:52:20.676073 systemd-timesyncd[1161]: Initial clock synchronization to Thu 2025-05-08 00:52:20.945788 UTC. May 8 00:52:20.680152 systemd-resolved[1160]: Positive Trust Anchors: May 8 00:52:20.680166 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:20.680192 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:20.689893 systemd-resolved[1160]: Defaulting to hostname 'linux'. May 8 00:52:20.691363 systemd[1]: Started systemd-resolved.service. May 8 00:52:20.692239 systemd[1]: Reached target network.target. May 8 00:52:20.692994 systemd[1]: Reached target nss-lookup.target. May 8 00:52:20.693773 systemd[1]: Reached target sysinit.target. May 8 00:52:20.694620 systemd[1]: Started motdgen.path. May 8 00:52:20.695397 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:52:20.696656 systemd[1]: Started logrotate.timer. May 8 00:52:20.697462 systemd[1]: Started mdadm.timer. May 8 00:52:20.698140 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:52:20.698918 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:52:20.698964 systemd[1]: Reached target paths.target. May 8 00:52:20.699654 systemd[1]: Reached target timers.target. May 8 00:52:20.700711 systemd[1]: Listening on dbus.socket. May 8 00:52:20.702592 systemd[1]: Starting docker.socket... May 8 00:52:20.705769 systemd[1]: Listening on sshd.socket. May 8 00:52:20.706674 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.707195 systemd[1]: Listening on docker.socket. May 8 00:52:20.708008 systemd[1]: Reached target sockets.target. May 8 00:52:20.708731 systemd[1]: Reached target basic.target. May 8 00:52:20.709509 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:20.709542 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:20.710592 systemd[1]: Starting containerd.service... May 8 00:52:20.712296 systemd[1]: Starting dbus.service... May 8 00:52:20.714110 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:52:20.716187 systemd[1]: Starting extend-filesystems.service... May 8 00:52:20.717109 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:52:20.718451 systemd[1]: Starting motdgen.service... May 8 00:52:20.723249 jq[1198]: false May 8 00:52:20.722146 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:52:20.724175 systemd[1]: Starting sshd-keygen.service... May 8 00:52:20.727052 systemd[1]: Starting systemd-logind.service... May 8 00:52:20.727841 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:20.728014 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:52:20.728481 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:52:20.729224 systemd[1]: Starting update-engine.service... May 8 00:52:20.731962 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:52:20.734575 jq[1212]: true May 8 00:52:20.734589 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:52:20.734772 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:52:20.735175 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:52:20.735354 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:52:20.740548 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:52:20.740740 systemd[1]: Finished motdgen.service. May 8 00:52:20.748757 jq[1218]: true May 8 00:52:20.760471 extend-filesystems[1199]: Found loop1 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda May 8 00:52:20.761571 extend-filesystems[1199]: Found vda1 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda2 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda3 May 8 00:52:20.761571 extend-filesystems[1199]: Found usr May 8 00:52:20.761571 extend-filesystems[1199]: Found vda4 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda6 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda7 May 8 00:52:20.761571 extend-filesystems[1199]: Found vda9 May 8 00:52:20.761571 extend-filesystems[1199]: Checking size of /dev/vda9 May 8 00:52:20.775051 dbus-daemon[1197]: [system] SELinux support is enabled May 8 00:52:20.775242 systemd[1]: Started dbus.service. May 8 00:52:20.778209 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:52:20.778240 systemd[1]: Reached target system-config.target. May 8 00:52:20.779192 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:52:20.779214 systemd[1]: Reached target user-config.target. May 8 00:52:20.794848 extend-filesystems[1199]: Resized partition /dev/vda9 May 8 00:52:20.796615 systemd-logind[1207]: Watching system buttons on /dev/input/event0 (Power Button) May 8 00:52:20.803502 extend-filesystems[1245]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:52:20.812873 systemd-logind[1207]: New seat seat0. May 8 00:52:20.814767 systemd[1]: Started systemd-logind.service. May 8 00:52:20.815907 bash[1241]: Updated "/home/core/.ssh/authorized_keys" May 8 00:52:20.816075 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:52:20.816834 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:52:20.827008 update_engine[1210]: I0508 00:52:20.826673 1210 main.cc:92] Flatcar Update Engine starting May 8 00:52:20.831060 systemd[1]: Started update-engine.service. May 8 00:52:20.831212 update_engine[1210]: I0508 00:52:20.831190 1210 update_check_scheduler.cc:74] Next update check in 2m45s May 8 00:52:20.834059 systemd[1]: Started locksmithd.service. May 8 00:52:20.845960 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:52:20.866234 extend-filesystems[1245]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:52:20.866234 extend-filesystems[1245]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:52:20.866234 extend-filesystems[1245]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:52:20.872169 extend-filesystems[1199]: Resized filesystem in /dev/vda9 May 8 00:52:20.868574 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:52:20.868775 systemd[1]: Finished extend-filesystems.service. May 8 00:52:20.875280 env[1219]: time="2025-05-08T00:52:20.875158000Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:52:20.893202 env[1219]: time="2025-05-08T00:52:20.893120840Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:52:20.893395 env[1219]: time="2025-05-08T00:52:20.893312920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896220 env[1219]: time="2025-05-08T00:52:20.896106840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:20.896220 env[1219]: time="2025-05-08T00:52:20.896139440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896416 env[1219]: time="2025-05-08T00:52:20.896382480Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:20.896416 env[1219]: time="2025-05-08T00:52:20.896407960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896468 env[1219]: time="2025-05-08T00:52:20.896422760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:52:20.896468 env[1219]: time="2025-05-08T00:52:20.896432680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896524 env[1219]: time="2025-05-08T00:52:20.896510920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896742 env[1219]: time="2025-05-08T00:52:20.896714240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:20.896854 env[1219]: time="2025-05-08T00:52:20.896836840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:20.896878 env[1219]: time="2025-05-08T00:52:20.896856120Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:52:20.896936 env[1219]: time="2025-05-08T00:52:20.896909160Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:52:20.896982 env[1219]: time="2025-05-08T00:52:20.896942520Z" level=info msg="metadata content store policy set" policy=shared May 8 00:52:20.900186 env[1219]: time="2025-05-08T00:52:20.900149360Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:52:20.900186 env[1219]: time="2025-05-08T00:52:20.900185720Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:52:20.900292 env[1219]: time="2025-05-08T00:52:20.900199240Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:52:20.900292 env[1219]: time="2025-05-08T00:52:20.900232600Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900292 env[1219]: time="2025-05-08T00:52:20.900254400Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900292 env[1219]: time="2025-05-08T00:52:20.900269040Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900292 env[1219]: time="2025-05-08T00:52:20.900281640Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900633 env[1219]: time="2025-05-08T00:52:20.900611600Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900667 env[1219]: time="2025-05-08T00:52:20.900637400Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900667 env[1219]: time="2025-05-08T00:52:20.900651640Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900667 env[1219]: time="2025-05-08T00:52:20.900663360Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:52:20.900722 env[1219]: time="2025-05-08T00:52:20.900676080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:52:20.900808 env[1219]: time="2025-05-08T00:52:20.900791400Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:52:20.900887 env[1219]: time="2025-05-08T00:52:20.900872040Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901130840Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901177640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901191480Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901354920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901372800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901385240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901397680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901410080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901422440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901433400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901444960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901460960Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901598360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901614280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902584 env[1219]: time="2025-05-08T00:52:20.901627160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:52:20.902899 env[1219]: time="2025-05-08T00:52:20.901638600Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:52:20.902899 env[1219]: time="2025-05-08T00:52:20.901652400Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:52:20.902899 env[1219]: time="2025-05-08T00:52:20.901665480Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:52:20.902899 env[1219]: time="2025-05-08T00:52:20.901682000Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:52:20.902899 env[1219]: time="2025-05-08T00:52:20.901715880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:52:20.903036 env[1219]: time="2025-05-08T00:52:20.901961000Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:52:20.903036 env[1219]: time="2025-05-08T00:52:20.902027480Z" level=info msg="Connect containerd service" May 8 00:52:20.903036 env[1219]: time="2025-05-08T00:52:20.902060520Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:52:20.903844 env[1219]: time="2025-05-08T00:52:20.903740760Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:52:20.904263 env[1219]: time="2025-05-08T00:52:20.904215080Z" level=info msg="Start subscribing containerd event" May 8 00:52:20.904347 env[1219]: time="2025-05-08T00:52:20.904268880Z" level=info msg="Start recovering state" May 8 00:52:20.904347 env[1219]: time="2025-05-08T00:52:20.904333640Z" level=info msg="Start event monitor" May 8 00:52:20.904397 env[1219]: time="2025-05-08T00:52:20.904352480Z" level=info msg="Start snapshots syncer" May 8 00:52:20.904397 env[1219]: time="2025-05-08T00:52:20.904362560Z" level=info msg="Start cni network conf syncer for default" May 8 00:52:20.904397 env[1219]: time="2025-05-08T00:52:20.904370440Z" level=info msg="Start streaming server" May 8 00:52:20.904525 env[1219]: time="2025-05-08T00:52:20.904503040Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:52:20.904637 env[1219]: time="2025-05-08T00:52:20.904620520Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:52:20.904850 systemd[1]: Started containerd.service. May 8 00:52:20.905960 env[1219]: time="2025-05-08T00:52:20.905584560Z" level=info msg="containerd successfully booted in 0.031917s" May 8 00:52:20.912365 locksmithd[1246]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:52:21.781205 systemd-networkd[1052]: eth0: Gained IPv6LL May 8 00:52:21.783022 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:52:21.784271 systemd[1]: Reached target network-online.target. May 8 00:52:21.786659 systemd[1]: Starting kubelet.service... May 8 00:52:22.313749 systemd[1]: Started kubelet.service. May 8 00:52:22.808357 kubelet[1260]: E0508 00:52:22.808306 1260 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:22.810492 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:22.810637 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:23.529580 sshd_keygen[1211]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:52:23.548887 systemd[1]: Finished sshd-keygen.service. May 8 00:52:23.551423 systemd[1]: Starting issuegen.service... May 8 00:52:23.556198 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:52:23.556365 systemd[1]: Finished issuegen.service. May 8 00:52:23.558741 systemd[1]: Starting systemd-user-sessions.service... May 8 00:52:23.565540 systemd[1]: Finished systemd-user-sessions.service. May 8 00:52:23.568325 systemd[1]: Started getty@tty1.service. May 8 00:52:23.570784 systemd[1]: Started serial-getty@ttyAMA0.service. May 8 00:52:23.572018 systemd[1]: Reached target getty.target. May 8 00:52:23.572913 systemd[1]: Reached target multi-user.target. May 8 00:52:23.575510 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:52:23.583540 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:52:23.583706 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:52:23.584881 systemd[1]: Startup finished in 588ms (kernel) + 3.882s (initrd) + 6.132s (userspace) = 10.603s. May 8 00:52:26.901706 systemd[1]: Created slice system-sshd.slice. May 8 00:52:26.902753 systemd[1]: Started sshd@0-10.0.0.132:22-10.0.0.1:50142.service. May 8 00:52:26.944456 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 50142 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:26.946680 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:26.955904 systemd-logind[1207]: New session 1 of user core. May 8 00:52:26.956808 systemd[1]: Created slice user-500.slice. May 8 00:52:26.957875 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:52:26.966909 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:52:26.968275 systemd[1]: Starting user@500.service... May 8 00:52:26.971630 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.035762 systemd[1286]: Queued start job for default target default.target. May 8 00:52:27.036307 systemd[1286]: Reached target paths.target. May 8 00:52:27.036326 systemd[1286]: Reached target sockets.target. May 8 00:52:27.036337 systemd[1286]: Reached target timers.target. May 8 00:52:27.036347 systemd[1286]: Reached target basic.target. May 8 00:52:27.036397 systemd[1286]: Reached target default.target. May 8 00:52:27.036421 systemd[1286]: Startup finished in 58ms. May 8 00:52:27.036474 systemd[1]: Started user@500.service. May 8 00:52:27.037405 systemd[1]: Started session-1.scope. May 8 00:52:27.089808 systemd[1]: Started sshd@1-10.0.0.132:22-10.0.0.1:50148.service. May 8 00:52:27.121259 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 50148 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.122333 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.126149 systemd-logind[1207]: New session 2 of user core. May 8 00:52:27.126849 systemd[1]: Started session-2.scope. May 8 00:52:27.181213 sshd[1295]: pam_unix(sshd:session): session closed for user core May 8 00:52:27.184674 systemd[1]: sshd@1-10.0.0.132:22-10.0.0.1:50148.service: Deactivated successfully. May 8 00:52:27.185273 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:52:27.185797 systemd-logind[1207]: Session 2 logged out. Waiting for processes to exit. May 8 00:52:27.186783 systemd[1]: Started sshd@2-10.0.0.132:22-10.0.0.1:50150.service. May 8 00:52:27.187505 systemd-logind[1207]: Removed session 2. May 8 00:52:27.217986 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 50150 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.219367 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.222432 systemd-logind[1207]: New session 3 of user core. May 8 00:52:27.223214 systemd[1]: Started session-3.scope. May 8 00:52:27.273290 sshd[1301]: pam_unix(sshd:session): session closed for user core May 8 00:52:27.276679 systemd[1]: sshd@2-10.0.0.132:22-10.0.0.1:50150.service: Deactivated successfully. May 8 00:52:27.277292 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:52:27.277823 systemd-logind[1207]: Session 3 logged out. Waiting for processes to exit. May 8 00:52:27.278819 systemd[1]: Started sshd@3-10.0.0.132:22-10.0.0.1:50166.service. May 8 00:52:27.279541 systemd-logind[1207]: Removed session 3. May 8 00:52:27.310825 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 50166 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.312083 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.315485 systemd-logind[1207]: New session 4 of user core. May 8 00:52:27.316277 systemd[1]: Started session-4.scope. May 8 00:52:27.370899 sshd[1307]: pam_unix(sshd:session): session closed for user core May 8 00:52:27.374986 systemd[1]: sshd@3-10.0.0.132:22-10.0.0.1:50166.service: Deactivated successfully. May 8 00:52:27.375585 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:52:27.376151 systemd-logind[1207]: Session 4 logged out. Waiting for processes to exit. May 8 00:52:27.377171 systemd[1]: Started sshd@4-10.0.0.132:22-10.0.0.1:50176.service. May 8 00:52:27.378054 systemd-logind[1207]: Removed session 4. May 8 00:52:27.408195 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 50176 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.409278 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.412242 systemd-logind[1207]: New session 5 of user core. May 8 00:52:27.412977 systemd[1]: Started session-5.scope. May 8 00:52:27.471976 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:52:27.472189 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:27.486841 dbus-daemon[1197]: avc: received setenforce notice (enforcing=1) May 8 00:52:27.487029 sudo[1317]: pam_unix(sudo:session): session closed for user root May 8 00:52:27.488851 sshd[1314]: pam_unix(sshd:session): session closed for user core May 8 00:52:27.492673 systemd[1]: sshd@4-10.0.0.132:22-10.0.0.1:50176.service: Deactivated successfully. May 8 00:52:27.493307 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:52:27.493840 systemd-logind[1207]: Session 5 logged out. Waiting for processes to exit. May 8 00:52:27.494836 systemd[1]: Started sshd@5-10.0.0.132:22-10.0.0.1:50178.service. May 8 00:52:27.495545 systemd-logind[1207]: Removed session 5. May 8 00:52:27.526267 sshd[1321]: Accepted publickey for core from 10.0.0.1 port 50178 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.527722 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.531792 systemd-logind[1207]: New session 6 of user core. May 8 00:52:27.532605 systemd[1]: Started session-6.scope. May 8 00:52:27.586804 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:52:27.587060 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:27.589863 sudo[1325]: pam_unix(sudo:session): session closed for user root May 8 00:52:27.594002 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:52:27.594202 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:27.602565 systemd[1]: Stopping audit-rules.service... May 8 00:52:27.602000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:27.604286 kernel: kauditd_printk_skb: 117 callbacks suppressed May 8 00:52:27.604318 kernel: audit: type=1305 audit(1746665547.602:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:27.604584 auditctl[1328]: No rules May 8 00:52:27.604767 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:52:27.604911 systemd[1]: Stopped audit-rules.service. May 8 00:52:27.602000 audit[1328]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcc1e5500 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.606250 systemd[1]: Starting audit-rules.service... May 8 00:52:27.609752 kernel: audit: type=1300 audit(1746665547.602:206): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcc1e5500 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.609813 kernel: audit: type=1327 audit(1746665547.602:206): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:27.602000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:27.610378 kernel: audit: type=1131 audit(1746665547.604:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.624859 augenrules[1345]: No rules May 8 00:52:27.625585 systemd[1]: Finished audit-rules.service. May 8 00:52:27.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.626761 sudo[1324]: pam_unix(sudo:session): session closed for user root May 8 00:52:27.625000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.628924 sshd[1321]: pam_unix(sshd:session): session closed for user core May 8 00:52:27.631394 kernel: audit: type=1130 audit(1746665547.624:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.631446 kernel: audit: type=1106 audit(1746665547.625:209): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.631464 kernel: audit: type=1104 audit(1746665547.625:210): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.625000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.631550 systemd[1]: Started sshd@6-10.0.0.132:22-10.0.0.1:50192.service. May 8 00:52:27.633448 systemd[1]: sshd@5-10.0.0.132:22-10.0.0.1:50178.service: Deactivated successfully. May 8 00:52:27.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.132:22-10.0.0.1:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.634070 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:52:27.634853 systemd-logind[1207]: Session 6 logged out. Waiting for processes to exit. May 8 00:52:27.635560 systemd-logind[1207]: Removed session 6. May 8 00:52:27.636674 kernel: audit: type=1130 audit(1746665547.630:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.132:22-10.0.0.1:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.636719 kernel: audit: type=1106 audit(1746665547.631:212): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.631000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.631000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.642642 kernel: audit: type=1104 audit(1746665547.631:213): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.132:22-10.0.0.1:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.665000 audit[1350]: USER_ACCT pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.666516 sshd[1350]: Accepted publickey for core from 10.0.0.1 port 50192 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:27.666000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.666000 audit[1350]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9d4eb80 a2=3 a3=1 items=0 ppid=1 pid=1350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:27.667731 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:27.671855 systemd[1]: Started session-7.scope. May 8 00:52:27.672131 systemd-logind[1207]: New session 7 of user core. May 8 00:52:27.674000 audit[1350]: USER_START pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.676000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:27.722000 audit[1354]: USER_ACCT pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.722000 audit[1354]: CRED_REFR pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.724455 sudo[1354]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:52:27.725290 sudo[1354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:27.725000 audit[1354]: USER_START pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:27.737149 systemd[1]: Starting coreos-metadata.service... May 8 00:52:27.743740 systemd[1]: coreos-metadata.service: Deactivated successfully. May 8 00:52:27.743909 systemd[1]: Finished coreos-metadata.service. May 8 00:52:27.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:27.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.250384 systemd[1]: Stopped kubelet.service. May 8 00:52:28.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.252529 systemd[1]: Starting kubelet.service... May 8 00:52:28.269423 systemd[1]: Reloading. May 8 00:52:28.320100 /usr/lib/systemd/system-generators/torcx-generator[1418]: time="2025-05-08T00:52:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:28.320427 /usr/lib/systemd/system-generators/torcx-generator[1418]: time="2025-05-08T00:52:28Z" level=info msg="torcx already run" May 8 00:52:28.494926 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:28.494968 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:28.510632 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:28.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit: BPF prog-id=46 op=LOAD May 8 00:52:28.559000 audit: BPF prog-id=41 op=UNLOAD May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit: BPF prog-id=47 op=LOAD May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.559000 audit: BPF prog-id=48 op=LOAD May 8 00:52:28.559000 audit: BPF prog-id=42 op=UNLOAD May 8 00:52:28.559000 audit: BPF prog-id=43 op=UNLOAD May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit: BPF prog-id=49 op=LOAD May 8 00:52:28.560000 audit: BPF prog-id=30 op=UNLOAD May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit: BPF prog-id=50 op=LOAD May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.560000 audit: BPF prog-id=51 op=LOAD May 8 00:52:28.560000 audit: BPF prog-id=31 op=UNLOAD May 8 00:52:28.560000 audit: BPF prog-id=32 op=UNLOAD May 8 00:52:28.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.561000 audit: BPF prog-id=52 op=LOAD May 8 00:52:28.561000 audit: BPF prog-id=44 op=UNLOAD May 8 00:52:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.563000 audit: BPF prog-id=53 op=LOAD May 8 00:52:28.563000 audit: BPF prog-id=39 op=UNLOAD May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit: BPF prog-id=54 op=LOAD May 8 00:52:28.564000 audit: BPF prog-id=40 op=UNLOAD May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.564000 audit: BPF prog-id=55 op=LOAD May 8 00:52:28.564000 audit: BPF prog-id=33 op=UNLOAD May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit: BPF prog-id=56 op=LOAD May 8 00:52:28.565000 audit: BPF prog-id=34 op=UNLOAD May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit: BPF prog-id=57 op=LOAD May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.565000 audit: BPF prog-id=58 op=LOAD May 8 00:52:28.565000 audit: BPF prog-id=35 op=UNLOAD May 8 00:52:28.565000 audit: BPF prog-id=36 op=UNLOAD May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit: BPF prog-id=59 op=LOAD May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.566000 audit: BPF prog-id=60 op=LOAD May 8 00:52:28.566000 audit: BPF prog-id=37 op=UNLOAD May 8 00:52:28.566000 audit: BPF prog-id=38 op=UNLOAD May 8 00:52:28.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.576469 systemd[1]: Started kubelet.service. May 8 00:52:28.578312 systemd[1]: Stopping kubelet.service... May 8 00:52:28.578765 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:52:28.578994 systemd[1]: Stopped kubelet.service. May 8 00:52:28.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.580645 systemd[1]: Starting kubelet.service... May 8 00:52:28.669969 systemd[1]: Started kubelet.service. May 8 00:52:28.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:28.706291 kubelet[1463]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:52:28.706291 kubelet[1463]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:52:28.706291 kubelet[1463]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:52:28.707553 kubelet[1463]: I0508 00:52:28.707241 1463 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:52:30.026890 kubelet[1463]: I0508 00:52:30.026839 1463 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 8 00:52:30.026890 kubelet[1463]: I0508 00:52:30.026877 1463 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:52:30.027286 kubelet[1463]: I0508 00:52:30.027105 1463 server.go:927] "Client rotation is on, will bootstrap in background" May 8 00:52:30.058662 kubelet[1463]: I0508 00:52:30.058600 1463 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:52:30.081844 kubelet[1463]: I0508 00:52:30.081801 1463 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:52:30.083146 kubelet[1463]: I0508 00:52:30.083077 1463 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:52:30.083324 kubelet[1463]: I0508 00:52:30.083129 1463 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.132","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 8 00:52:30.083415 kubelet[1463]: I0508 00:52:30.083385 1463 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:52:30.083415 kubelet[1463]: I0508 00:52:30.083395 1463 container_manager_linux.go:301] "Creating device plugin manager" May 8 00:52:30.083680 kubelet[1463]: I0508 00:52:30.083655 1463 state_mem.go:36] "Initialized new in-memory state store" May 8 00:52:30.089333 kubelet[1463]: I0508 00:52:30.089304 1463 kubelet.go:400] "Attempting to sync node with API server" May 8 00:52:30.089378 kubelet[1463]: I0508 00:52:30.089340 1463 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:52:30.089785 kubelet[1463]: I0508 00:52:30.089770 1463 kubelet.go:312] "Adding apiserver pod source" May 8 00:52:30.090064 kubelet[1463]: I0508 00:52:30.090050 1463 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:52:30.090064 kubelet[1463]: E0508 00:52:30.090043 1463 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:30.090318 kubelet[1463]: E0508 00:52:30.090298 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:30.091826 kubelet[1463]: I0508 00:52:30.091797 1463 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:52:30.092417 kubelet[1463]: I0508 00:52:30.092394 1463 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:52:30.092622 kubelet[1463]: W0508 00:52:30.092604 1463 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:52:30.093806 kubelet[1463]: I0508 00:52:30.093788 1463 server.go:1264] "Started kubelet" May 8 00:52:30.094000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:30.094000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:30.094000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ceff80 a1=4000799608 a2=4000ceff50 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.094000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:30.094000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:30.094000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:30.094000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005acf60 a1=4000799620 a2=4000052f60 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.094000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:30.095475 kubelet[1463]: I0508 00:52:30.095248 1463 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:52:30.095475 kubelet[1463]: I0508 00:52:30.095317 1463 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:52:30.095524 kubelet[1463]: I0508 00:52:30.095500 1463 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:52:30.106399 kubelet[1463]: W0508 00:52:30.106370 1463 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.132" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 8 00:52:30.106501 kubelet[1463]: E0508 00:52:30.106489 1463 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.132" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 8 00:52:30.108807 kubelet[1463]: I0508 00:52:30.108778 1463 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:52:30.110483 kubelet[1463]: I0508 00:52:30.110464 1463 volume_manager.go:291] "Starting Kubelet Volume Manager" May 8 00:52:30.111260 kubelet[1463]: I0508 00:52:30.111240 1463 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:52:30.111371 kubelet[1463]: I0508 00:52:30.111344 1463 server.go:455] "Adding debug handlers to kubelet server" May 8 00:52:30.112235 kubelet[1463]: I0508 00:52:30.112183 1463 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:52:30.112406 kubelet[1463]: I0508 00:52:30.112389 1463 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:52:30.113259 kubelet[1463]: I0508 00:52:30.113235 1463 reconciler.go:26] "Reconciler: start to sync state" May 8 00:52:30.114423 kubelet[1463]: I0508 00:52:30.114395 1463 factory.go:221] Registration of the systemd container factory successfully May 8 00:52:30.114516 kubelet[1463]: I0508 00:52:30.114495 1463 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:52:30.120013 kubelet[1463]: E0508 00:52:30.119992 1463 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:52:30.121013 kubelet[1463]: I0508 00:52:30.120984 1463 factory.go:221] Registration of the containerd container factory successfully May 8 00:52:30.131874 kubelet[1463]: E0508 00:52:30.131838 1463 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.132\" not found" node="10.0.0.132" May 8 00:52:30.133420 kubelet[1463]: I0508 00:52:30.133389 1463 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:52:30.133420 kubelet[1463]: I0508 00:52:30.133405 1463 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:52:30.133420 kubelet[1463]: I0508 00:52:30.133424 1463 state_mem.go:36] "Initialized new in-memory state store" May 8 00:52:30.193934 kubelet[1463]: I0508 00:52:30.193891 1463 policy_none.go:49] "None policy: Start" May 8 00:52:30.195077 kubelet[1463]: I0508 00:52:30.195057 1463 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:52:30.195140 kubelet[1463]: I0508 00:52:30.195084 1463 state_mem.go:35] "Initializing new in-memory state store" May 8 00:52:30.201322 systemd[1]: Created slice kubepods.slice. May 8 00:52:30.205301 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:52:30.205000 audit[1480]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.205000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd1f583d0 a2=0 a3=1 items=0 ppid=1463 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:52:30.206000 audit[1483]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.206000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff28d3f10 a2=0 a3=1 items=0 ppid=1463 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:52:30.211280 kubelet[1463]: I0508 00:52:30.211258 1463 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.132" May 8 00:52:30.215240 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:52:30.216494 kubelet[1463]: I0508 00:52:30.216467 1463 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:52:30.215000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:30.215000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:30.215000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f8edb0 a1=4000939aa0 a2=4000f8ed80 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.215000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:30.216906 kubelet[1463]: I0508 00:52:30.216887 1463 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:52:30.217212 kubelet[1463]: I0508 00:52:30.217123 1463 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:52:30.217303 kubelet[1463]: I0508 00:52:30.217286 1463 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:52:30.219406 kubelet[1463]: E0508 00:52:30.219381 1463 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.132\" not found" May 8 00:52:30.219827 kubelet[1463]: I0508 00:52:30.219805 1463 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.132" May 8 00:52:30.208000 audit[1485]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.208000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff8609030 a2=0 a3=1 items=0 ppid=1463 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:30.232743 kubelet[1463]: E0508 00:52:30.232688 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.230000 audit[1490]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.230000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe46845f0 a2=0 a3=1 items=0 ppid=1463 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:30.268000 audit[1495]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.268000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd9b1ca30 a2=0 a3=1 items=0 ppid=1463 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:52:30.269637 kubelet[1463]: I0508 00:52:30.269574 1463 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:52:30.269000 audit[1496]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:30.269000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc4da4150 a2=0 a3=1 items=0 ppid=1463 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:52:30.270691 kubelet[1463]: I0508 00:52:30.270666 1463 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:52:30.269000 audit[1497]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.269000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9d29790 a2=0 a3=1 items=0 ppid=1463 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.270983 kubelet[1463]: I0508 00:52:30.270932 1463 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:52:30.270983 kubelet[1463]: I0508 00:52:30.270963 1463 kubelet.go:2337] "Starting kubelet main sync loop" May 8 00:52:30.271038 kubelet[1463]: E0508 00:52:30.271023 1463 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 8 00:52:30.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:52:30.271000 audit[1499]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.271000 audit[1499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc1599830 a2=0 a3=1 items=0 ppid=1463 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:52:30.271000 audit[1498]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:30.271000 audit[1498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb1767d0 a2=0 a3=1 items=0 ppid=1463 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:52:30.272000 audit[1500]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:30.272000 audit[1500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc76a90a0 a2=0 a3=1 items=0 ppid=1463 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:52:30.273000 audit[1501]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:30.273000 audit[1501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcc61c940 a2=0 a3=1 items=0 ppid=1463 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:52:30.274000 audit[1502]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:30.274000 audit[1502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc90abb50 a2=0 a3=1 items=0 ppid=1463 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:52:30.333810 kubelet[1463]: E0508 00:52:30.333704 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.434049 kubelet[1463]: E0508 00:52:30.434000 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.535024 kubelet[1463]: E0508 00:52:30.534978 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.635859 kubelet[1463]: E0508 00:52:30.635750 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.686851 sudo[1354]: pam_unix(sudo:session): session closed for user root May 8 00:52:30.686000 audit[1354]: USER_END pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:30.686000 audit[1354]: CRED_DISP pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:30.690253 sshd[1350]: pam_unix(sshd:session): session closed for user core May 8 00:52:30.690000 audit[1350]: USER_END pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.690000 audit[1350]: CRED_DISP pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.693002 systemd[1]: sshd@6-10.0.0.132:22-10.0.0.1:50192.service: Deactivated successfully. May 8 00:52:30.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.132:22-10.0.0.1:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:30.693768 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:52:30.694365 systemd-logind[1207]: Session 7 logged out. Waiting for processes to exit. May 8 00:52:30.695880 systemd-logind[1207]: Removed session 7. May 8 00:52:30.736358 kubelet[1463]: E0508 00:52:30.736302 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.837012 kubelet[1463]: E0508 00:52:30.836968 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:30.938090 kubelet[1463]: E0508 00:52:30.937982 1463 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.132\" not found" May 8 00:52:31.033558 kubelet[1463]: I0508 00:52:31.033509 1463 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 8 00:52:31.033900 kubelet[1463]: W0508 00:52:31.033692 1463 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:52:31.033900 kubelet[1463]: W0508 00:52:31.033722 1463 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:52:31.033900 kubelet[1463]: W0508 00:52:31.033743 1463 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:52:31.033900 kubelet[1463]: W0508 00:52:31.033763 1463 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:52:31.039758 kubelet[1463]: I0508 00:52:31.039221 1463 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 8 00:52:31.039758 kubelet[1463]: I0508 00:52:31.039739 1463 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 8 00:52:31.039936 env[1219]: time="2025-05-08T00:52:31.039541023Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:52:31.091085 kubelet[1463]: I0508 00:52:31.090916 1463 apiserver.go:52] "Watching apiserver" May 8 00:52:31.091085 kubelet[1463]: E0508 00:52:31.091003 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:31.101839 kubelet[1463]: I0508 00:52:31.100819 1463 topology_manager.go:215] "Topology Admit Handler" podUID="efcf0848-548c-4161-a511-fec391458792" podNamespace="calico-system" podName="calico-node-8hmwr" May 8 00:52:31.101839 kubelet[1463]: I0508 00:52:31.100940 1463 topology_manager.go:215] "Topology Admit Handler" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" podNamespace="calico-system" podName="csi-node-driver-nbwgm" May 8 00:52:31.101839 kubelet[1463]: I0508 00:52:31.101020 1463 topology_manager.go:215] "Topology Admit Handler" podUID="ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4" podNamespace="kube-system" podName="kube-proxy-spxsj" May 8 00:52:31.101839 kubelet[1463]: E0508 00:52:31.101249 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:31.108309 systemd[1]: Created slice kubepods-besteffort-podefcf0848_548c_4161_a511_fec391458792.slice. May 8 00:52:31.112506 kubelet[1463]: I0508 00:52:31.112472 1463 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:52:31.120132 kubelet[1463]: I0508 00:52:31.120081 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4-xtables-lock\") pod \"kube-proxy-spxsj\" (UID: \"ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4\") " pod="kube-system/kube-proxy-spxsj" May 8 00:52:31.120132 kubelet[1463]: I0508 00:52:31.120129 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4-lib-modules\") pod \"kube-proxy-spxsj\" (UID: \"ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4\") " pod="kube-system/kube-proxy-spxsj" May 8 00:52:31.120266 kubelet[1463]: I0508 00:52:31.120151 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-lib-modules\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120266 kubelet[1463]: I0508 00:52:31.120170 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/efcf0848-548c-4161-a511-fec391458792-node-certs\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120266 kubelet[1463]: I0508 00:52:31.120199 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-flexvol-driver-host\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120266 kubelet[1463]: I0508 00:52:31.120220 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mk89\" (UniqueName: \"kubernetes.io/projected/efcf0848-548c-4161-a511-fec391458792-kube-api-access-7mk89\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120266 kubelet[1463]: I0508 00:52:31.120235 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4-kube-proxy\") pod \"kube-proxy-spxsj\" (UID: \"ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4\") " pod="kube-system/kube-proxy-spxsj" May 8 00:52:31.120386 kubelet[1463]: I0508 00:52:31.120252 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4lqr\" (UniqueName: \"kubernetes.io/projected/04a9320f-2bb9-413d-b384-2750bc6b5d1b-kube-api-access-z4lqr\") pod \"csi-node-driver-nbwgm\" (UID: \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\") " pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:31.120386 kubelet[1463]: I0508 00:52:31.120268 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/efcf0848-548c-4161-a511-fec391458792-tigera-ca-bundle\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120386 kubelet[1463]: I0508 00:52:31.120283 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-cni-bin-dir\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120386 kubelet[1463]: I0508 00:52:31.120300 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-cni-log-dir\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120386 kubelet[1463]: I0508 00:52:31.120316 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/04a9320f-2bb9-413d-b384-2750bc6b5d1b-varrun\") pod \"csi-node-driver-nbwgm\" (UID: \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\") " pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:31.120493 kubelet[1463]: I0508 00:52:31.120332 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/04a9320f-2bb9-413d-b384-2750bc6b5d1b-registration-dir\") pod \"csi-node-driver-nbwgm\" (UID: \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\") " pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:31.120493 kubelet[1463]: I0508 00:52:31.120352 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/04a9320f-2bb9-413d-b384-2750bc6b5d1b-socket-dir\") pod \"csi-node-driver-nbwgm\" (UID: \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\") " pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:31.120493 kubelet[1463]: I0508 00:52:31.120367 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-xtables-lock\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120493 kubelet[1463]: I0508 00:52:31.120383 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-policysync\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120493 kubelet[1463]: I0508 00:52:31.120398 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-var-run-calico\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120608 kubelet[1463]: I0508 00:52:31.120413 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-cni-net-dir\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120608 kubelet[1463]: I0508 00:52:31.120428 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/04a9320f-2bb9-413d-b384-2750bc6b5d1b-kubelet-dir\") pod \"csi-node-driver-nbwgm\" (UID: \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\") " pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:31.120608 kubelet[1463]: I0508 00:52:31.120443 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/efcf0848-548c-4161-a511-fec391458792-var-lib-calico\") pod \"calico-node-8hmwr\" (UID: \"efcf0848-548c-4161-a511-fec391458792\") " pod="calico-system/calico-node-8hmwr" May 8 00:52:31.120608 kubelet[1463]: I0508 00:52:31.120465 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w9m9s\" (UniqueName: \"kubernetes.io/projected/ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4-kube-api-access-w9m9s\") pod \"kube-proxy-spxsj\" (UID: \"ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4\") " pod="kube-system/kube-proxy-spxsj" May 8 00:52:31.124773 systemd[1]: Created slice kubepods-besteffort-podef4dd135_bb62_4f89_9d43_ad5c5cf43bc4.slice. May 8 00:52:31.223249 kubelet[1463]: E0508 00:52:31.223199 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.223249 kubelet[1463]: W0508 00:52:31.223224 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.223249 kubelet[1463]: E0508 00:52:31.223246 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.223581 kubelet[1463]: E0508 00:52:31.223435 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.223581 kubelet[1463]: W0508 00:52:31.223443 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.223581 kubelet[1463]: E0508 00:52:31.223453 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.223808 kubelet[1463]: E0508 00:52:31.223793 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.223808 kubelet[1463]: W0508 00:52:31.223806 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.223985 kubelet[1463]: E0508 00:52:31.223918 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.224132 kubelet[1463]: E0508 00:52:31.223986 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.224132 kubelet[1463]: W0508 00:52:31.224125 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.224229 kubelet[1463]: E0508 00:52:31.224149 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.224606 kubelet[1463]: E0508 00:52:31.224493 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.224606 kubelet[1463]: W0508 00:52:31.224503 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.224822 kubelet[1463]: E0508 00:52:31.224644 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.224822 kubelet[1463]: W0508 00:52:31.224651 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.224822 kubelet[1463]: E0508 00:52:31.224811 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.224822 kubelet[1463]: W0508 00:52:31.224817 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.225021 kubelet[1463]: E0508 00:52:31.225001 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.225110 kubelet[1463]: E0508 00:52:31.225095 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.225173 kubelet[1463]: E0508 00:52:31.225162 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.225490 kubelet[1463]: E0508 00:52:31.225362 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.225490 kubelet[1463]: W0508 00:52:31.225376 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.225791 kubelet[1463]: E0508 00:52:31.225615 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.225791 kubelet[1463]: W0508 00:52:31.225621 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.225791 kubelet[1463]: E0508 00:52:31.225759 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.225791 kubelet[1463]: W0508 00:52:31.225766 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.226033 kubelet[1463]: E0508 00:52:31.225906 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.226033 kubelet[1463]: W0508 00:52:31.225912 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.226098 kubelet[1463]: E0508 00:52:31.226056 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.226098 kubelet[1463]: W0508 00:52:31.226064 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.226182 kubelet[1463]: E0508 00:52:31.226165 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.226249 kubelet[1463]: E0508 00:52:31.226237 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.226313 kubelet[1463]: E0508 00:52:31.226301 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.226370 kubelet[1463]: E0508 00:52:31.226358 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.226461 kubelet[1463]: E0508 00:52:31.226430 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.227132 kubelet[1463]: E0508 00:52:31.226988 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.227132 kubelet[1463]: W0508 00:52:31.227002 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.227132 kubelet[1463]: E0508 00:52:31.227036 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.247436 kubelet[1463]: E0508 00:52:31.247393 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.247436 kubelet[1463]: W0508 00:52:31.247428 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.247559 kubelet[1463]: E0508 00:52:31.247476 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.248018 kubelet[1463]: E0508 00:52:31.247992 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.248018 kubelet[1463]: W0508 00:52:31.248012 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.248401 kubelet[1463]: E0508 00:52:31.248370 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.248401 kubelet[1463]: W0508 00:52:31.248390 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.248528 kubelet[1463]: E0508 00:52:31.248507 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.248789 kubelet[1463]: E0508 00:52:31.248759 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.248789 kubelet[1463]: W0508 00:52:31.248778 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.248944 kubelet[1463]: E0508 00:52:31.248915 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.248991 kubelet[1463]: W0508 00:52:31.248927 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249103 kubelet[1463]: E0508 00:52:31.249089 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249103 kubelet[1463]: W0508 00:52:31.249099 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249235 kubelet[1463]: E0508 00:52:31.249219 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249235 kubelet[1463]: W0508 00:52:31.249230 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249373 kubelet[1463]: E0508 00:52:31.249354 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249373 kubelet[1463]: W0508 00:52:31.249366 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249579 kubelet[1463]: E0508 00:52:31.249555 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249579 kubelet[1463]: W0508 00:52:31.249570 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249730 kubelet[1463]: E0508 00:52:31.249709 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249730 kubelet[1463]: W0508 00:52:31.249723 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249868 kubelet[1463]: E0508 00:52:31.249849 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.249868 kubelet[1463]: W0508 00:52:31.249862 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.249944 kubelet[1463]: E0508 00:52:31.249874 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250117 kubelet[1463]: E0508 00:52:31.250094 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.250117 kubelet[1463]: W0508 00:52:31.250108 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.250190 kubelet[1463]: E0508 00:52:31.250121 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250190 kubelet[1463]: E0508 00:52:31.250145 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250306 kubelet[1463]: E0508 00:52:31.250288 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.250306 kubelet[1463]: W0508 00:52:31.250301 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.250370 kubelet[1463]: E0508 00:52:31.250309 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250568 kubelet[1463]: E0508 00:52:31.250538 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.250568 kubelet[1463]: W0508 00:52:31.250554 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.250568 kubelet[1463]: E0508 00:52:31.250564 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250667 kubelet[1463]: E0508 00:52:31.250581 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250730 kubelet[1463]: E0508 00:52:31.250709 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.250730 kubelet[1463]: W0508 00:52:31.250723 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.250730 kubelet[1463]: E0508 00:52:31.250731 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.250886 kubelet[1463]: E0508 00:52:31.250865 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.250886 kubelet[1463]: W0508 00:52:31.250877 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.250886 kubelet[1463]: E0508 00:52:31.250884 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.251036 kubelet[1463]: E0508 00:52:31.250900 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.251036 kubelet[1463]: E0508 00:52:31.251025 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.251036 kubelet[1463]: W0508 00:52:31.251033 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.251103 kubelet[1463]: E0508 00:52:31.251040 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.251197 kubelet[1463]: E0508 00:52:31.251172 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.251197 kubelet[1463]: W0508 00:52:31.251187 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.251265 kubelet[1463]: E0508 00:52:31.251203 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.253241 kubelet[1463]: E0508 00:52:31.253209 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.253241 kubelet[1463]: E0508 00:52:31.253234 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.253241 kubelet[1463]: E0508 00:52:31.253245 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.253388 kubelet[1463]: E0508 00:52:31.253256 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.253388 kubelet[1463]: E0508 00:52:31.253288 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.258637 kubelet[1463]: E0508 00:52:31.258611 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.258637 kubelet[1463]: W0508 00:52:31.258630 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.258748 kubelet[1463]: E0508 00:52:31.258646 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.259439 kubelet[1463]: E0508 00:52:31.259423 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.259475 kubelet[1463]: W0508 00:52:31.259440 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.259475 kubelet[1463]: E0508 00:52:31.259453 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.259637 kubelet[1463]: E0508 00:52:31.259626 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.259637 kubelet[1463]: W0508 00:52:31.259636 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.259694 kubelet[1463]: E0508 00:52:31.259646 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.259909 kubelet[1463]: E0508 00:52:31.259897 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.259909 kubelet[1463]: W0508 00:52:31.259909 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.260031 kubelet[1463]: E0508 00:52:31.260013 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.260339 kubelet[1463]: E0508 00:52:31.260327 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.260339 kubelet[1463]: W0508 00:52:31.260339 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.260457 kubelet[1463]: E0508 00:52:31.260442 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.260536 kubelet[1463]: E0508 00:52:31.260483 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.260598 kubelet[1463]: W0508 00:52:31.260585 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.260767 kubelet[1463]: E0508 00:52:31.260741 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.260909 kubelet[1463]: E0508 00:52:31.260896 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.261036 kubelet[1463]: W0508 00:52:31.261022 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.261291 kubelet[1463]: E0508 00:52:31.261279 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.261371 kubelet[1463]: W0508 00:52:31.261349 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.261615 kubelet[1463]: E0508 00:52:31.261603 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.261696 kubelet[1463]: W0508 00:52:31.261683 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.261920 kubelet[1463]: E0508 00:52:31.261858 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.262000 kubelet[1463]: E0508 00:52:31.261964 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.262065 kubelet[1463]: E0508 00:52:31.262053 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.262141 kubelet[1463]: W0508 00:52:31.262129 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.262224 kubelet[1463]: E0508 00:52:31.262056 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.262261 kubelet[1463]: E0508 00:52:31.262229 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.262494 kubelet[1463]: E0508 00:52:31.262480 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.262567 kubelet[1463]: W0508 00:52:31.262553 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.262679 kubelet[1463]: E0508 00:52:31.262646 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.262864 kubelet[1463]: E0508 00:52:31.262851 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.262974 kubelet[1463]: W0508 00:52:31.262928 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.263062 kubelet[1463]: E0508 00:52:31.263041 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.263277 kubelet[1463]: E0508 00:52:31.263263 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:31.263348 kubelet[1463]: W0508 00:52:31.263336 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:31.263427 kubelet[1463]: E0508 00:52:31.263414 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:31.423172 kubelet[1463]: E0508 00:52:31.423119 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:31.423995 env[1219]: time="2025-05-08T00:52:31.423917202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8hmwr,Uid:efcf0848-548c-4161-a511-fec391458792,Namespace:calico-system,Attempt:0,}" May 8 00:52:31.427701 kubelet[1463]: E0508 00:52:31.427672 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:31.428301 env[1219]: time="2025-05-08T00:52:31.428110977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-spxsj,Uid:ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4,Namespace:kube-system,Attempt:0,}" May 8 00:52:32.091453 kubelet[1463]: E0508 00:52:32.091405 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:32.100196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2186225738.mount: Deactivated successfully. May 8 00:52:32.106122 env[1219]: time="2025-05-08T00:52:32.106085279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.107630 env[1219]: time="2025-05-08T00:52:32.107548407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.110268 env[1219]: time="2025-05-08T00:52:32.110242229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.111336 env[1219]: time="2025-05-08T00:52:32.111314985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.111958 env[1219]: time="2025-05-08T00:52:32.111923641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.113819 env[1219]: time="2025-05-08T00:52:32.113793587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.115643 env[1219]: time="2025-05-08T00:52:32.115618990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.118267 env[1219]: time="2025-05-08T00:52:32.118235496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:32.150003 env[1219]: time="2025-05-08T00:52:32.149936988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:32.150003 env[1219]: time="2025-05-08T00:52:32.149974638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:32.150003 env[1219]: time="2025-05-08T00:52:32.149989432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:32.150289 env[1219]: time="2025-05-08T00:52:32.150248753Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d59895b9708471606970df48997c8aab493bff92552864bc9c17152ad10b2c5d pid=1570 runtime=io.containerd.runc.v2 May 8 00:52:32.151192 env[1219]: time="2025-05-08T00:52:32.151026917Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:32.151192 env[1219]: time="2025-05-08T00:52:32.151069203Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:32.151192 env[1219]: time="2025-05-08T00:52:32.151080167Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:32.151400 env[1219]: time="2025-05-08T00:52:32.151357870Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49 pid=1571 runtime=io.containerd.runc.v2 May 8 00:52:32.169922 systemd[1]: Started cri-containerd-e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49.scope. May 8 00:52:32.173663 systemd[1]: Started cri-containerd-d59895b9708471606970df48997c8aab493bff92552864bc9c17152ad10b2c5d.scope. May 8 00:52:32.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.206000 audit: BPF prog-id=61 op=LOAD May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1570 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393839356239373038343731363036393730646634383939376338 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1570 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393839356239373038343731363036393730646634383939376338 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit: BPF prog-id=62 op=LOAD May 8 00:52:32.207000 audit[1592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1570 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393839356239373038343731363036393730646634383939376338 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit: BPF prog-id=63 op=LOAD May 8 00:52:32.207000 audit[1592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1570 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393839356239373038343731363036393730646634383939376338 May 8 00:52:32.207000 audit: BPF prog-id=63 op=UNLOAD May 8 00:52:32.207000 audit: BPF prog-id=62 op=UNLOAD May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.207000 audit: BPF prog-id=64 op=LOAD May 8 00:52:32.207000 audit[1592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1570 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393839356239373038343731363036393730646634383939376338 May 8 00:52:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.209000 audit: BPF prog-id=65 op=LOAD May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1571 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613966343933343137623632316462376137616664336366383235 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1571 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613966343933343137623632316462376137616664336366383235 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit: BPF prog-id=66 op=LOAD May 8 00:52:32.210000 audit[1593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1571 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613966343933343137623632316462376137616664336366383235 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit: BPF prog-id=67 op=LOAD May 8 00:52:32.210000 audit[1593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1571 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613966343933343137623632316462376137616664336366383235 May 8 00:52:32.210000 audit: BPF prog-id=67 op=UNLOAD May 8 00:52:32.210000 audit: BPF prog-id=66 op=UNLOAD May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:32.210000 audit: BPF prog-id=68 op=LOAD May 8 00:52:32.210000 audit[1593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1571 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613966343933343137623632316462376137616664336366383235 May 8 00:52:32.223610 env[1219]: time="2025-05-08T00:52:32.221651413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-spxsj,Uid:ef4dd135-bb62-4f89-9d43-ad5c5cf43bc4,Namespace:kube-system,Attempt:0,} returns sandbox id \"d59895b9708471606970df48997c8aab493bff92552864bc9c17152ad10b2c5d\"" May 8 00:52:32.223713 kubelet[1463]: E0508 00:52:32.222768 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:32.224459 env[1219]: time="2025-05-08T00:52:32.224428115Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 8 00:52:32.225814 env[1219]: time="2025-05-08T00:52:32.225785668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8hmwr,Uid:efcf0848-548c-4161-a511-fec391458792,Namespace:calico-system,Attempt:0,} returns sandbox id \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\"" May 8 00:52:32.226726 kubelet[1463]: E0508 00:52:32.226535 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:33.091811 kubelet[1463]: E0508 00:52:33.091726 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:33.271650 kubelet[1463]: E0508 00:52:33.271590 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:33.277612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908279504.mount: Deactivated successfully. May 8 00:52:33.800536 env[1219]: time="2025-05-08T00:52:33.800480509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.802472 env[1219]: time="2025-05-08T00:52:33.802440392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.804637 env[1219]: time="2025-05-08T00:52:33.804609610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.806071 env[1219]: time="2025-05-08T00:52:33.806033430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.806574 env[1219]: time="2025-05-08T00:52:33.806548108Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 8 00:52:33.808228 env[1219]: time="2025-05-08T00:52:33.808103699Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:52:33.809388 env[1219]: time="2025-05-08T00:52:33.809356565Z" level=info msg="CreateContainer within sandbox \"d59895b9708471606970df48997c8aab493bff92552864bc9c17152ad10b2c5d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:52:33.820113 env[1219]: time="2025-05-08T00:52:33.820069271Z" level=info msg="CreateContainer within sandbox \"d59895b9708471606970df48997c8aab493bff92552864bc9c17152ad10b2c5d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8677ff076ae90982519749760f8aa2da63184d5f3b89c70a259b113c60ae47d8\"" May 8 00:52:33.820912 env[1219]: time="2025-05-08T00:52:33.820882767Z" level=info msg="StartContainer for \"8677ff076ae90982519749760f8aa2da63184d5f3b89c70a259b113c60ae47d8\"" May 8 00:52:33.838485 systemd[1]: Started cri-containerd-8677ff076ae90982519749760f8aa2da63184d5f3b89c70a259b113c60ae47d8.scope. May 8 00:52:33.864568 kernel: kauditd_printk_skb: 357 callbacks suppressed May 8 00:52:33.864677 kernel: audit: type=1400 audit(1746665553.860:458): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.864703 kernel: audit: type=1300 audit(1746665553.860:458): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1570 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1570 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373766663037366165393039383235313937343937363066386161 May 8 00:52:33.871447 kernel: audit: type=1327 audit(1746665553.860:458): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373766663037366165393039383235313937343937363066386161 May 8 00:52:33.871510 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.876196 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.878751 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.878809 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.883374 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.886336 env[1219]: time="2025-05-08T00:52:33.886296689Z" level=info msg="StartContainer for \"8677ff076ae90982519749760f8aa2da63184d5f3b89c70a259b113c60ae47d8\" returns successfully" May 8 00:52:33.886536 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.889085 kernel: audit: type=1400 audit(1746665553.860:459): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.860000 audit: BPF prog-id=69 op=LOAD May 8 00:52:33.860000 audit[1646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1570 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373766663037366165393039383235313937343937363066386161 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.861000 audit: BPF prog-id=70 op=LOAD May 8 00:52:33.861000 audit[1646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1570 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373766663037366165393039383235313937343937363066386161 May 8 00:52:33.863000 audit: BPF prog-id=70 op=UNLOAD May 8 00:52:33.863000 audit: BPF prog-id=69 op=UNLOAD May 8 00:52:33.863000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.863000 audit: BPF prog-id=71 op=LOAD May 8 00:52:33.863000 audit[1646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1570 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373766663037366165393039383235313937343937363066386161 May 8 00:52:33.995000 audit[1700]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:33.995000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd17a8f10 a2=0 a3=1 items=0 ppid=1658 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:52:33.996000 audit[1701]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:33.996000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec1b47d0 a2=0 a3=1 items=0 ppid=1658 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:52:33.996000 audit[1702]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:33.996000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc15bc450 a2=0 a3=1 items=0 ppid=1658 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:52:33.997000 audit[1704]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:33.997000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc9bebd0 a2=0 a3=1 items=0 ppid=1658 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:52:33.998000 audit[1703]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:33.998000 audit[1703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9996410 a2=0 a3=1 items=0 ppid=1658 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:52:33.999000 audit[1705]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:33.999000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb1f0670 a2=0 a3=1 items=0 ppid=1658 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:52:34.092398 kubelet[1463]: E0508 00:52:34.092279 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:34.101000 audit[1706]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.101000 audit[1706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffce2687e0 a2=0 a3=1 items=0 ppid=1658 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:52:34.105000 audit[1708]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.105000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffded7cfd0 a2=0 a3=1 items=0 ppid=1658 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:52:34.109000 audit[1711]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.109000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff372b970 a2=0 a3=1 items=0 ppid=1658 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:52:34.110000 audit[1712]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.110000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe0677b0 a2=0 a3=1 items=0 ppid=1658 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:52:34.112000 audit[1714]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.112000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb7e4150 a2=0 a3=1 items=0 ppid=1658 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:52:34.113000 audit[1715]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.113000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8a8ca50 a2=0 a3=1 items=0 ppid=1658 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:52:34.115000 audit[1717]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.115000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd226eb50 a2=0 a3=1 items=0 ppid=1658 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:52:34.118000 audit[1720]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.118000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcb22b5b0 a2=0 a3=1 items=0 ppid=1658 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:52:34.119000 audit[1721]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.119000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeba704e0 a2=0 a3=1 items=0 ppid=1658 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:52:34.122000 audit[1723]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.122000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1a77a40 a2=0 a3=1 items=0 ppid=1658 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:52:34.123000 audit[1724]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.123000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd984ea10 a2=0 a3=1 items=0 ppid=1658 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:52:34.125000 audit[1726]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.125000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd737c920 a2=0 a3=1 items=0 ppid=1658 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:34.129000 audit[1729]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.129000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc514c300 a2=0 a3=1 items=0 ppid=1658 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:34.132000 audit[1732]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.132000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc648ee80 a2=0 a3=1 items=0 ppid=1658 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:52:34.133000 audit[1733]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.133000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc8be0830 a2=0 a3=1 items=0 ppid=1658 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:52:34.135000 audit[1735]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.135000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff06181b0 a2=0 a3=1 items=0 ppid=1658 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:34.154000 audit[1740]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.154000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcb008a90 a2=0 a3=1 items=0 ppid=1658 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:34.155000 audit[1741]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.155000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff3c2ca0 a2=0 a3=1 items=0 ppid=1658 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:52:34.156000 audit[1743]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:34.156000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd01b11a0 a2=0 a3=1 items=0 ppid=1658 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:52:34.181000 audit[1749]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:34.181000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcbbfd260 a2=0 a3=1 items=0 ppid=1658 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:34.199000 audit[1749]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:34.199000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffcbbfd260 a2=0 a3=1 items=0 ppid=1658 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:34.201000 audit[1755]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.201000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc331d8b0 a2=0 a3=1 items=0 ppid=1658 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:52:34.204000 audit[1757]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.204000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe02aa380 a2=0 a3=1 items=0 ppid=1658 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:52:34.207000 audit[1760]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.207000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdc9fc630 a2=0 a3=1 items=0 ppid=1658 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:52:34.208000 audit[1761]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.208000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5629400 a2=0 a3=1 items=0 ppid=1658 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:52:34.211000 audit[1763]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.211000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3a94790 a2=0 a3=1 items=0 ppid=1658 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:52:34.212000 audit[1764]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.212000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2225bb0 a2=0 a3=1 items=0 ppid=1658 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:52:34.214000 audit[1766]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.214000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdfa0a8f0 a2=0 a3=1 items=0 ppid=1658 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:52:34.218000 audit[1769]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.218000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff325f1b0 a2=0 a3=1 items=0 ppid=1658 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:52:34.219000 audit[1770]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.219000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf591210 a2=0 a3=1 items=0 ppid=1658 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:52:34.221000 audit[1772]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.221000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe011e570 a2=0 a3=1 items=0 ppid=1658 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:52:34.222000 audit[1773]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.222000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6b5e4e0 a2=0 a3=1 items=0 ppid=1658 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:52:34.225000 audit[1775]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.225000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe514f400 a2=0 a3=1 items=0 ppid=1658 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:34.228000 audit[1778]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.228000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe412a290 a2=0 a3=1 items=0 ppid=1658 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:52:34.232000 audit[1781]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.232000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe538d5e0 a2=0 a3=1 items=0 ppid=1658 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:52:34.233000 audit[1782]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.233000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd44d9590 a2=0 a3=1 items=0 ppid=1658 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:52:34.235000 audit[1784]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.235000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcb637770 a2=0 a3=1 items=0 ppid=1658 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:34.238000 audit[1787]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.238000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe5a29750 a2=0 a3=1 items=0 ppid=1658 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:34.239000 audit[1788]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.239000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4e14fc0 a2=0 a3=1 items=0 ppid=1658 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:52:34.242000 audit[1790]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.242000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc4f38030 a2=0 a3=1 items=0 ppid=1658 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:52:34.244000 audit[1791]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.244000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0b6e500 a2=0 a3=1 items=0 ppid=1658 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:52:34.246000 audit[1793]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.246000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcd9c4400 a2=0 a3=1 items=0 ppid=1658 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:34.250000 audit[1796]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:34.250000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc155ac50 a2=0 a3=1 items=0 ppid=1658 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:34.253000 audit[1798]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:52:34.253000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffef7dff40 a2=0 a3=1 items=0 ppid=1658 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.253000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:34.254000 audit[1798]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:52:34.254000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffef7dff40 a2=0 a3=1 items=0 ppid=1658 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.254000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:34.277707 systemd[1]: run-containerd-runc-k8s.io-8677ff076ae90982519749760f8aa2da63184d5f3b89c70a259b113c60ae47d8-runc.scdMiC.mount: Deactivated successfully. May 8 00:52:34.282122 kubelet[1463]: E0508 00:52:34.282040 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:34.290322 kubelet[1463]: I0508 00:52:34.290242 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-spxsj" podStartSLOduration=2.706649707 podStartE2EDuration="4.290226952s" podCreationTimestamp="2025-05-08 00:52:30 +0000 UTC" firstStartedPulling="2025-05-08 00:52:32.223920801 +0000 UTC m=+3.549835479" lastFinishedPulling="2025-05-08 00:52:33.807497966 +0000 UTC m=+5.133412724" observedRunningTime="2025-05-08 00:52:34.289822036 +0000 UTC m=+5.615736713" watchObservedRunningTime="2025-05-08 00:52:34.290226952 +0000 UTC m=+5.616141629" May 8 00:52:34.338021 kubelet[1463]: E0508 00:52:34.337981 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338021 kubelet[1463]: W0508 00:52:34.338007 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338021 kubelet[1463]: E0508 00:52:34.338026 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.338226 kubelet[1463]: E0508 00:52:34.338194 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338226 kubelet[1463]: W0508 00:52:34.338205 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338226 kubelet[1463]: E0508 00:52:34.338218 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.338444 kubelet[1463]: E0508 00:52:34.338422 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338444 kubelet[1463]: W0508 00:52:34.338436 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338444 kubelet[1463]: E0508 00:52:34.338446 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.338620 kubelet[1463]: E0508 00:52:34.338595 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338620 kubelet[1463]: W0508 00:52:34.338607 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338620 kubelet[1463]: E0508 00:52:34.338615 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.338769 kubelet[1463]: E0508 00:52:34.338758 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338800 kubelet[1463]: W0508 00:52:34.338770 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338800 kubelet[1463]: E0508 00:52:34.338778 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.338944 kubelet[1463]: E0508 00:52:34.338919 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.338971 kubelet[1463]: W0508 00:52:34.338943 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.338971 kubelet[1463]: E0508 00:52:34.338952 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339085 kubelet[1463]: E0508 00:52:34.339075 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339118 kubelet[1463]: W0508 00:52:34.339085 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339118 kubelet[1463]: E0508 00:52:34.339092 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339243 kubelet[1463]: E0508 00:52:34.339233 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339267 kubelet[1463]: W0508 00:52:34.339242 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339267 kubelet[1463]: E0508 00:52:34.339250 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339420 kubelet[1463]: E0508 00:52:34.339392 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339420 kubelet[1463]: W0508 00:52:34.339404 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339420 kubelet[1463]: E0508 00:52:34.339412 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339548 kubelet[1463]: E0508 00:52:34.339537 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339572 kubelet[1463]: W0508 00:52:34.339547 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339572 kubelet[1463]: E0508 00:52:34.339555 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339680 kubelet[1463]: E0508 00:52:34.339670 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339704 kubelet[1463]: W0508 00:52:34.339680 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339704 kubelet[1463]: E0508 00:52:34.339688 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339815 kubelet[1463]: E0508 00:52:34.339805 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.339838 kubelet[1463]: W0508 00:52:34.339815 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.339838 kubelet[1463]: E0508 00:52:34.339822 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.339976 kubelet[1463]: E0508 00:52:34.339966 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340003 kubelet[1463]: W0508 00:52:34.339977 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340003 kubelet[1463]: E0508 00:52:34.339985 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340113 kubelet[1463]: E0508 00:52:34.340103 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340137 kubelet[1463]: W0508 00:52:34.340113 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340137 kubelet[1463]: E0508 00:52:34.340120 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340246 kubelet[1463]: E0508 00:52:34.340236 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340270 kubelet[1463]: W0508 00:52:34.340246 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340270 kubelet[1463]: E0508 00:52:34.340253 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340377 kubelet[1463]: E0508 00:52:34.340368 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340410 kubelet[1463]: W0508 00:52:34.340377 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340410 kubelet[1463]: E0508 00:52:34.340386 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340528 kubelet[1463]: E0508 00:52:34.340517 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340552 kubelet[1463]: W0508 00:52:34.340529 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340552 kubelet[1463]: E0508 00:52:34.340536 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340662 kubelet[1463]: E0508 00:52:34.340652 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340687 kubelet[1463]: W0508 00:52:34.340662 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340687 kubelet[1463]: E0508 00:52:34.340669 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340788 kubelet[1463]: E0508 00:52:34.340778 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340813 kubelet[1463]: W0508 00:52:34.340788 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340813 kubelet[1463]: E0508 00:52:34.340795 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.340919 kubelet[1463]: E0508 00:52:34.340909 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.340949 kubelet[1463]: W0508 00:52:34.340919 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.340949 kubelet[1463]: E0508 00:52:34.340926 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.349296 kubelet[1463]: E0508 00:52:34.349217 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.349296 kubelet[1463]: W0508 00:52:34.349237 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.349296 kubelet[1463]: E0508 00:52:34.349250 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.350346 kubelet[1463]: E0508 00:52:34.350290 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.350346 kubelet[1463]: W0508 00:52:34.350309 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.350346 kubelet[1463]: E0508 00:52:34.350342 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.350665 kubelet[1463]: E0508 00:52:34.350635 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.350665 kubelet[1463]: W0508 00:52:34.350659 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.351010 kubelet[1463]: E0508 00:52:34.350751 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.351010 kubelet[1463]: E0508 00:52:34.350859 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.351010 kubelet[1463]: W0508 00:52:34.350869 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.351010 kubelet[1463]: E0508 00:52:34.350878 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.351413 kubelet[1463]: E0508 00:52:34.351073 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.351413 kubelet[1463]: W0508 00:52:34.351085 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.351413 kubelet[1463]: E0508 00:52:34.351095 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.351413 kubelet[1463]: E0508 00:52:34.351272 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.351413 kubelet[1463]: W0508 00:52:34.351281 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.351413 kubelet[1463]: E0508 00:52:34.351291 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.351784 kubelet[1463]: E0508 00:52:34.351493 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.351784 kubelet[1463]: W0508 00:52:34.351503 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.351784 kubelet[1463]: E0508 00:52:34.351513 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.352103 kubelet[1463]: E0508 00:52:34.351992 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.352103 kubelet[1463]: W0508 00:52:34.352008 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.352103 kubelet[1463]: E0508 00:52:34.352056 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.352493 kubelet[1463]: E0508 00:52:34.352253 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.352493 kubelet[1463]: W0508 00:52:34.352264 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.352493 kubelet[1463]: E0508 00:52:34.352274 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.353288 kubelet[1463]: E0508 00:52:34.352526 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.353288 kubelet[1463]: W0508 00:52:34.352542 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.353288 kubelet[1463]: E0508 00:52:34.352554 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.353288 kubelet[1463]: E0508 00:52:34.352840 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.353288 kubelet[1463]: W0508 00:52:34.352850 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.353288 kubelet[1463]: E0508 00:52:34.352867 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.353784 kubelet[1463]: E0508 00:52:34.353365 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:34.353784 kubelet[1463]: W0508 00:52:34.353377 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:34.353784 kubelet[1463]: E0508 00:52:34.353395 1463 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:34.804040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount285996910.mount: Deactivated successfully. May 8 00:52:34.907433 env[1219]: time="2025-05-08T00:52:34.907384867Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:34.908607 env[1219]: time="2025-05-08T00:52:34.908570482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:34.909884 env[1219]: time="2025-05-08T00:52:34.909860114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:34.911002 env[1219]: time="2025-05-08T00:52:34.910970605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:34.911535 env[1219]: time="2025-05-08T00:52:34.911511365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 8 00:52:34.913779 env[1219]: time="2025-05-08T00:52:34.913746953Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:52:34.922816 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3127303297.mount: Deactivated successfully. May 8 00:52:34.926406 env[1219]: time="2025-05-08T00:52:34.926371819Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e\"" May 8 00:52:34.926854 env[1219]: time="2025-05-08T00:52:34.926825866Z" level=info msg="StartContainer for \"766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e\"" May 8 00:52:34.940486 systemd[1]: Started cri-containerd-766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e.scope. May 8 00:52:34.962000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.962000 audit[1839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1571 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366337353738363932383635613162633264393162323261366361 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit: BPF prog-id=72 op=LOAD May 8 00:52:34.963000 audit[1839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1571 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366337353738363932383635613162633264393162323261366361 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.963000 audit: BPF prog-id=73 op=LOAD May 8 00:52:34.963000 audit[1839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1571 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366337353738363932383635613162633264393162323261366361 May 8 00:52:34.964000 audit: BPF prog-id=73 op=UNLOAD May 8 00:52:34.964000 audit: BPF prog-id=72 op=UNLOAD May 8 00:52:34.964000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:34.964000 audit: BPF prog-id=74 op=LOAD May 8 00:52:34.964000 audit[1839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1571 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:34.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366337353738363932383635613162633264393162323261366361 May 8 00:52:34.982907 env[1219]: time="2025-05-08T00:52:34.982864146Z" level=info msg="StartContainer for \"766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e\" returns successfully" May 8 00:52:34.995515 systemd[1]: cri-containerd-766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e.scope: Deactivated successfully. May 8 00:52:35.001000 audit: BPF prog-id=74 op=UNLOAD May 8 00:52:35.093113 kubelet[1463]: E0508 00:52:35.092990 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:35.145566 env[1219]: time="2025-05-08T00:52:35.145519889Z" level=info msg="shim disconnected" id=766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e May 8 00:52:35.145566 env[1219]: time="2025-05-08T00:52:35.145563635Z" level=warning msg="cleaning up after shim disconnected" id=766c7578692865a1bc2d91b22a6ca5d18e307e03f4358b4cb6871d4a6020162e namespace=k8s.io May 8 00:52:35.145566 env[1219]: time="2025-05-08T00:52:35.145572682Z" level=info msg="cleaning up dead shim" May 8 00:52:35.151813 env[1219]: time="2025-05-08T00:52:35.151781453Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:52:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1876 runtime=io.containerd.runc.v2\n" May 8 00:52:35.271625 kubelet[1463]: E0508 00:52:35.271261 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:35.284099 kubelet[1463]: E0508 00:52:35.284074 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:35.284533 kubelet[1463]: E0508 00:52:35.284510 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:35.285235 env[1219]: time="2025-05-08T00:52:35.285205917Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:52:36.094067 kubelet[1463]: E0508 00:52:36.093988 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:37.094154 kubelet[1463]: E0508 00:52:37.094099 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:37.271585 kubelet[1463]: E0508 00:52:37.271496 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:37.975231 env[1219]: time="2025-05-08T00:52:37.975191112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:37.976339 env[1219]: time="2025-05-08T00:52:37.976293210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:37.977565 env[1219]: time="2025-05-08T00:52:37.977546869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:37.979406 env[1219]: time="2025-05-08T00:52:37.979379267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:37.979881 env[1219]: time="2025-05-08T00:52:37.979855479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 8 00:52:37.981970 env[1219]: time="2025-05-08T00:52:37.981903132Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:52:38.001674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2812792654.mount: Deactivated successfully. May 8 00:52:38.003058 env[1219]: time="2025-05-08T00:52:38.003009375Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2\"" May 8 00:52:38.003500 env[1219]: time="2025-05-08T00:52:38.003476199Z" level=info msg="StartContainer for \"f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2\"" May 8 00:52:38.023743 systemd[1]: Started cri-containerd-f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2.scope. May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1571 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303330343737363630646636313532633963663562613037353136 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.046000 audit: BPF prog-id=75 op=LOAD May 8 00:52:38.046000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1571 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303330343737363630646636313532633963663562613037353136 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit: BPF prog-id=76 op=LOAD May 8 00:52:38.047000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1571 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303330343737363630646636313532633963663562613037353136 May 8 00:52:38.047000 audit: BPF prog-id=76 op=UNLOAD May 8 00:52:38.047000 audit: BPF prog-id=75 op=UNLOAD May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:38.047000 audit: BPF prog-id=77 op=LOAD May 8 00:52:38.047000 audit[1904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1571 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303330343737363630646636313532633963663562613037353136 May 8 00:52:38.061971 env[1219]: time="2025-05-08T00:52:38.061834320Z" level=info msg="StartContainer for \"f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2\" returns successfully" May 8 00:52:38.095192 kubelet[1463]: E0508 00:52:38.095152 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:38.291803 kubelet[1463]: E0508 00:52:38.291326 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:38.573686 env[1219]: time="2025-05-08T00:52:38.573565778Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:52:38.575764 systemd[1]: cri-containerd-f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2.scope: Deactivated successfully. May 8 00:52:38.580000 audit: BPF prog-id=77 op=UNLOAD May 8 00:52:38.583714 kubelet[1463]: I0508 00:52:38.583692 1463 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 8 00:52:38.691546 env[1219]: time="2025-05-08T00:52:38.691500497Z" level=info msg="shim disconnected" id=f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2 May 8 00:52:38.691546 env[1219]: time="2025-05-08T00:52:38.691545694Z" level=warning msg="cleaning up after shim disconnected" id=f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2 namespace=k8s.io May 8 00:52:38.691546 env[1219]: time="2025-05-08T00:52:38.691555167Z" level=info msg="cleaning up dead shim" May 8 00:52:38.697854 env[1219]: time="2025-05-08T00:52:38.697810638Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:52:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1947 runtime=io.containerd.runc.v2\n" May 8 00:52:38.999665 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f9030477660df6152c9cf5ba07516cb638b510d3638cb363b6e950ee1f1ca2f2-rootfs.mount: Deactivated successfully. May 8 00:52:39.096262 kubelet[1463]: E0508 00:52:39.096220 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:39.275343 systemd[1]: Created slice kubepods-besteffort-pod04a9320f_2bb9_413d_b384_2750bc6b5d1b.slice. May 8 00:52:39.277406 env[1219]: time="2025-05-08T00:52:39.277367676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nbwgm,Uid:04a9320f-2bb9-413d-b384-2750bc6b5d1b,Namespace:calico-system,Attempt:0,}" May 8 00:52:39.297744 kubelet[1463]: E0508 00:52:39.297390 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:39.300965 env[1219]: time="2025-05-08T00:52:39.299494226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:52:39.414790 env[1219]: time="2025-05-08T00:52:39.414693795Z" level=error msg="Failed to destroy network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:39.415117 env[1219]: time="2025-05-08T00:52:39.415080854Z" level=error msg="encountered an error cleaning up failed sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:39.415172 env[1219]: time="2025-05-08T00:52:39.415137626Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nbwgm,Uid:04a9320f-2bb9-413d-b384-2750bc6b5d1b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:39.416104 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50-shm.mount: Deactivated successfully. May 8 00:52:39.416332 kubelet[1463]: E0508 00:52:39.416273 1463 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:39.416377 kubelet[1463]: E0508 00:52:39.416355 1463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:39.416415 kubelet[1463]: E0508 00:52:39.416377 1463 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nbwgm" May 8 00:52:39.416446 kubelet[1463]: E0508 00:52:39.416422 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nbwgm_calico-system(04a9320f-2bb9-413d-b384-2750bc6b5d1b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nbwgm_calico-system(04a9320f-2bb9-413d-b384-2750bc6b5d1b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:40.096539 kubelet[1463]: E0508 00:52:40.096484 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:40.301204 kubelet[1463]: I0508 00:52:40.301177 1463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:40.301917 env[1219]: time="2025-05-08T00:52:40.301879052Z" level=info msg="StopPodSandbox for \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\"" May 8 00:52:40.328567 env[1219]: time="2025-05-08T00:52:40.328511490Z" level=error msg="StopPodSandbox for \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\" failed" error="failed to destroy network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:40.328788 kubelet[1463]: E0508 00:52:40.328740 1463 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:40.328849 kubelet[1463]: E0508 00:52:40.328804 1463 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50"} May 8 00:52:40.328894 kubelet[1463]: E0508 00:52:40.328863 1463 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:40.328970 kubelet[1463]: E0508 00:52:40.328905 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04a9320f-2bb9-413d-b384-2750bc6b5d1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nbwgm" podUID="04a9320f-2bb9-413d-b384-2750bc6b5d1b" May 8 00:52:41.097575 kubelet[1463]: E0508 00:52:41.097526 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:41.518368 kubelet[1463]: I0508 00:52:41.518322 1463 topology_manager.go:215] "Topology Admit Handler" podUID="a070d2c9-4364-45fa-a528-0ff2afd73d6a" podNamespace="default" podName="nginx-deployment-85f456d6dd-9hshn" May 8 00:52:41.522805 systemd[1]: Created slice kubepods-besteffort-poda070d2c9_4364_45fa_a528_0ff2afd73d6a.slice. May 8 00:52:41.698343 kubelet[1463]: I0508 00:52:41.698290 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k9jwg\" (UniqueName: \"kubernetes.io/projected/a070d2c9-4364-45fa-a528-0ff2afd73d6a-kube-api-access-k9jwg\") pod \"nginx-deployment-85f456d6dd-9hshn\" (UID: \"a070d2c9-4364-45fa-a528-0ff2afd73d6a\") " pod="default/nginx-deployment-85f456d6dd-9hshn" May 8 00:52:41.826872 env[1219]: time="2025-05-08T00:52:41.826624117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9hshn,Uid:a070d2c9-4364-45fa-a528-0ff2afd73d6a,Namespace:default,Attempt:0,}" May 8 00:52:41.890638 env[1219]: time="2025-05-08T00:52:41.890575258Z" level=error msg="Failed to destroy network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:41.891182 env[1219]: time="2025-05-08T00:52:41.891146951Z" level=error msg="encountered an error cleaning up failed sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:41.891334 env[1219]: time="2025-05-08T00:52:41.891305561Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9hshn,Uid:a070d2c9-4364-45fa-a528-0ff2afd73d6a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:41.892348 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6-shm.mount: Deactivated successfully. May 8 00:52:41.893115 kubelet[1463]: E0508 00:52:41.893052 1463 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:41.893197 kubelet[1463]: E0508 00:52:41.893137 1463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-9hshn" May 8 00:52:41.893197 kubelet[1463]: E0508 00:52:41.893158 1463 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-9hshn" May 8 00:52:41.893262 kubelet[1463]: E0508 00:52:41.893201 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-9hshn_default(a070d2c9-4364-45fa-a528-0ff2afd73d6a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-9hshn_default(a070d2c9-4364-45fa-a528-0ff2afd73d6a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-9hshn" podUID="a070d2c9-4364-45fa-a528-0ff2afd73d6a" May 8 00:52:42.098397 kubelet[1463]: E0508 00:52:42.098008 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:42.304981 kubelet[1463]: I0508 00:52:42.304946 1463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:42.305663 env[1219]: time="2025-05-08T00:52:42.305622751Z" level=info msg="StopPodSandbox for \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\"" May 8 00:52:42.327329 env[1219]: time="2025-05-08T00:52:42.327261640Z" level=error msg="StopPodSandbox for \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\" failed" error="failed to destroy network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:42.327491 kubelet[1463]: E0508 00:52:42.327452 1463 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:42.327543 kubelet[1463]: E0508 00:52:42.327498 1463 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6"} May 8 00:52:42.327543 kubelet[1463]: E0508 00:52:42.327532 1463 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a070d2c9-4364-45fa-a528-0ff2afd73d6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:42.327622 kubelet[1463]: E0508 00:52:42.327553 1463 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a070d2c9-4364-45fa-a528-0ff2afd73d6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-9hshn" podUID="a070d2c9-4364-45fa-a528-0ff2afd73d6a" May 8 00:52:43.098388 kubelet[1463]: E0508 00:52:43.098331 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:43.471603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1512858710.mount: Deactivated successfully. May 8 00:52:43.561239 env[1219]: time="2025-05-08T00:52:43.561177726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:43.562508 env[1219]: time="2025-05-08T00:52:43.562475685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:43.563906 env[1219]: time="2025-05-08T00:52:43.563875746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:43.564990 env[1219]: time="2025-05-08T00:52:43.564965373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:43.565455 env[1219]: time="2025-05-08T00:52:43.565421909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 8 00:52:43.574653 env[1219]: time="2025-05-08T00:52:43.574608681Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:52:43.585718 env[1219]: time="2025-05-08T00:52:43.585688355Z" level=info msg="CreateContainer within sandbox \"e9a9f493417b621db7a7afd3cf825632da896e71d56f024c840c9c77de2b6c49\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"071f667a6f2271f2e4ae57b8c8a78da2eccde111ddcacd3cfef8280f4ab22d46\"" May 8 00:52:43.586192 env[1219]: time="2025-05-08T00:52:43.586159877Z" level=info msg="StartContainer for \"071f667a6f2271f2e4ae57b8c8a78da2eccde111ddcacd3cfef8280f4ab22d46\"" May 8 00:52:43.599503 systemd[1]: Started cri-containerd-071f667a6f2271f2e4ae57b8c8a78da2eccde111ddcacd3cfef8280f4ab22d46.scope. May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.625130 kernel: kauditd_printk_skb: 274 callbacks suppressed May 8 00:52:43.625194 kernel: audit: type=1400 audit(1746665563.623:529): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1571 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.630843 kernel: audit: type=1300 audit(1746665563.623:529): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1571 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.630899 kernel: audit: type=1327 audit(1746665563.623:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037316636363761366632323731663265346165353762386338613738 May 8 00:52:43.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037316636363761366632323731663265346165353762386338613738 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.636222 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.636276 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.641163 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.643521 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.643582 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.645966 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.649913 env[1219]: time="2025-05-08T00:52:43.649872459Z" level=info msg="StartContainer for \"071f667a6f2271f2e4ae57b8c8a78da2eccde111ddcacd3cfef8280f4ab22d46\" returns successfully" May 8 00:52:43.650845 kernel: audit: type=1400 audit(1746665563.623:530): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.623000 audit: BPF prog-id=78 op=LOAD May 8 00:52:43.623000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1571 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037316636363761366632323731663265346165353762386338613738 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.624000 audit: BPF prog-id=79 op=LOAD May 8 00:52:43.624000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1571 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037316636363761366632323731663265346165353762386338613738 May 8 00:52:43.626000 audit: BPF prog-id=79 op=UNLOAD May 8 00:52:43.626000 audit: BPF prog-id=78 op=UNLOAD May 8 00:52:43.626000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:43.626000 audit: BPF prog-id=80 op=LOAD May 8 00:52:43.626000 audit[2093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1571 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037316636363761366632323731663265346165353762386338613738 May 8 00:52:43.798348 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:52:43.798461 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:52:44.099350 kubelet[1463]: E0508 00:52:44.099301 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:44.309949 kubelet[1463]: E0508 00:52:44.309910 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:44.323936 kubelet[1463]: I0508 00:52:44.323864 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-8hmwr" podStartSLOduration=2.985275392 podStartE2EDuration="14.323849461s" podCreationTimestamp="2025-05-08 00:52:30 +0000 UTC" firstStartedPulling="2025-05-08 00:52:32.22772112 +0000 UTC m=+3.553635797" lastFinishedPulling="2025-05-08 00:52:43.566295189 +0000 UTC m=+14.892209866" observedRunningTime="2025-05-08 00:52:44.32322837 +0000 UTC m=+15.649143047" watchObservedRunningTime="2025-05-08 00:52:44.323849461 +0000 UTC m=+15.649764138" May 8 00:52:45.041000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=14634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.041000 audit[2188]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbf31a26 a2=241 a3=1b6 items=1 ppid=2163 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.041000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:52:45.041000 audit: PATH item=0 name="/dev/fd/63" inode=14628 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.041000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.043000 audit[2191]: AVC avc: denied { write } for pid=2191 comm="tee" name="fd" dev="proc" ino=14639 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.043000 audit[2191]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd20bba25 a2=241 a3=1b6 items=1 ppid=2168 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.043000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:52:45.043000 audit: PATH item=0 name="/dev/fd/63" inode=14629 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.044000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=14643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.044000 audit[2207]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5a1ba15 a2=241 a3=1b6 items=1 ppid=2157 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.044000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:52:45.044000 audit: PATH item=0 name="/dev/fd/63" inode=14636 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.051000 audit[2224]: AVC avc: denied { write } for pid=2224 comm="tee" name="fd" dev="proc" ino=14655 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.051000 audit[2224]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5f6ca16 a2=241 a3=1b6 items=1 ppid=2158 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.051000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:52:45.051000 audit: PATH item=0 name="/dev/fd/63" inode=13141 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.051000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.055000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=14661 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.055000 audit[2232]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3047a27 a2=241 a3=1b6 items=1 ppid=2167 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.055000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:52:45.055000 audit: PATH item=0 name="/dev/fd/63" inode=14012 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.055000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.056000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=14665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.056000 audit[2225]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6a6aa25 a2=241 a3=1b6 items=1 ppid=2171 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.056000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:52:45.056000 audit: PATH item=0 name="/dev/fd/63" inode=14009 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.056000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.067000 audit[2235]: AVC avc: denied { write } for pid=2235 comm="tee" name="fd" dev="proc" ino=14017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:45.067000 audit[2235]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe989aa25 a2=241 a3=1b6 items=1 ppid=2165 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.067000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:52:45.067000 audit: PATH item=0 name="/dev/fd/63" inode=15670 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:45.067000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:45.099498 kubelet[1463]: E0508 00:52:45.099432 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:45.177000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.177000 audit: BPF prog-id=81 op=LOAD May 8 00:52:45.177000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffcd86ad8 a2=98 a3=fffffcd86ac8 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.177000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.178000 audit: BPF prog-id=81 op=UNLOAD May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit: BPF prog-id=82 op=LOAD May 8 00:52:45.178000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcd86768 a2=74 a3=95 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.178000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.178000 audit: BPF prog-id=82 op=UNLOAD May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.178000 audit: BPF prog-id=83 op=LOAD May 8 00:52:45.178000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcd867c8 a2=94 a3=2 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.178000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.178000 audit: BPF prog-id=83 op=UNLOAD May 8 00:52:45.261000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit: BPF prog-id=84 op=LOAD May 8 00:52:45.261000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcd86788 a2=40 a3=fffffcd867b8 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.261000 audit: BPF prog-id=84 op=UNLOAD May 8 00:52:45.261000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.261000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffcd868a0 a2=50 a3=0 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd867f8 a2=28 a3=fffffcd86928 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcd86828 a2=28 a3=fffffcd86958 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcd866d8 a2=28 a3=fffffcd86808 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd86848 a2=28 a3=fffffcd86978 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd86828 a2=28 a3=fffffcd86958 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd86818 a2=28 a3=fffffcd86948 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd86848 a2=28 a3=fffffcd86978 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcd86828 a2=28 a3=fffffcd86958 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcd86848 a2=28 a3=fffffcd86978 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcd86818 a2=28 a3=fffffcd86948 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcd86898 a2=28 a3=fffffcd869d8 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffcd865d0 a2=50 a3=0 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit: BPF prog-id=85 op=LOAD May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffcd865d8 a2=94 a3=5 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit: BPF prog-id=85 op=UNLOAD May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffcd866e0 a2=50 a3=0 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffcd86828 a2=4 a3=3 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.270000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.270000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcd86808 a2=94 a3=6 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.271000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcd85fd8 a2=94 a3=83 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.271000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.271000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcd85fd8 a2=94 a3=83 items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit: BPF prog-id=86 op=LOAD May 8 00:52:45.284000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb670d48 a2=98 a3=ffffcb670d38 items=0 ppid=2166 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.284000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:45.284000 audit: BPF prog-id=86 op=UNLOAD May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit: BPF prog-id=87 op=LOAD May 8 00:52:45.284000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb670bf8 a2=74 a3=95 items=0 ppid=2166 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.284000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:45.284000 audit: BPF prog-id=87 op=UNLOAD May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.284000 audit: BPF prog-id=88 op=LOAD May 8 00:52:45.284000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb670c28 a2=40 a3=ffffcb670c58 items=0 ppid=2166 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.284000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:45.284000 audit: BPF prog-id=88 op=UNLOAD May 8 00:52:45.310472 kubelet[1463]: I0508 00:52:45.310372 1463 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:52:45.311136 kubelet[1463]: E0508 00:52:45.311118 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:45.333378 systemd-networkd[1052]: vxlan.calico: Link UP May 8 00:52:45.333386 systemd-networkd[1052]: vxlan.calico: Gained carrier May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit: BPF prog-id=89 op=LOAD May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7e3e8f8 a2=98 a3=ffffc7e3e8e8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit: BPF prog-id=89 op=UNLOAD May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit: BPF prog-id=90 op=LOAD May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7e3e5d8 a2=74 a3=95 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit: BPF prog-id=90 op=UNLOAD May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit: BPF prog-id=91 op=LOAD May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7e3e638 a2=94 a3=2 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit: BPF prog-id=91 op=UNLOAD May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e668 a2=28 a3=ffffc7e3e798 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7e3e698 a2=28 a3=ffffc7e3e7c8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7e3e548 a2=28 a3=ffffc7e3e678 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e6b8 a2=28 a3=ffffc7e3e7e8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e698 a2=28 a3=ffffc7e3e7c8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e688 a2=28 a3=ffffc7e3e7b8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e6b8 a2=28 a3=ffffc7e3e7e8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7e3e698 a2=28 a3=ffffc7e3e7c8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7e3e6b8 a2=28 a3=ffffc7e3e7e8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7e3e688 a2=28 a3=ffffc7e3e7b8 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7e3e708 a2=28 a3=ffffc7e3e848 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.353000 audit: BPF prog-id=92 op=LOAD May 8 00:52:45.353000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7e3e528 a2=40 a3=ffffc7e3e558 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.353000 audit: BPF prog-id=92 op=UNLOAD May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc7e3e550 a2=50 a3=0 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc7e3e550 a2=50 a3=0 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit: BPF prog-id=93 op=LOAD May 8 00:52:45.354000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7e3dcb8 a2=94 a3=2 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.354000 audit: BPF prog-id=93 op=UNLOAD May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.354000 audit: BPF prog-id=94 op=LOAD May 8 00:52:45.354000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7e3de48 a2=94 a3=30 items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit: BPF prog-id=95 op=LOAD May 8 00:52:45.357000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe48eb168 a2=98 a3=ffffe48eb158 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.357000 audit: BPF prog-id=95 op=UNLOAD May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit: BPF prog-id=96 op=LOAD May 8 00:52:45.357000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe48eadf8 a2=74 a3=95 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.357000 audit: BPF prog-id=96 op=UNLOAD May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.357000 audit: BPF prog-id=97 op=LOAD May 8 00:52:45.357000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe48eae58 a2=94 a3=2 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.357000 audit: BPF prog-id=97 op=UNLOAD May 8 00:52:45.445000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit: BPF prog-id=98 op=LOAD May 8 00:52:45.445000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe48eae18 a2=40 a3=ffffe48eae48 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.445000 audit: BPF prog-id=98 op=UNLOAD May 8 00:52:45.445000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.445000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe48eaf30 a2=50 a3=0 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eae88 a2=28 a3=ffffe48eafb8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe48eaeb8 a2=28 a3=ffffe48eafe8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe48ead68 a2=28 a3=ffffe48eae98 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eaed8 a2=28 a3=ffffe48eb008 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eaeb8 a2=28 a3=ffffe48eafe8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eaea8 a2=28 a3=ffffe48eafd8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eaed8 a2=28 a3=ffffe48eb008 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe48eaeb8 a2=28 a3=ffffe48eafe8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe48eaed8 a2=28 a3=ffffe48eb008 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe48eaea8 a2=28 a3=ffffe48eafd8 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe48eaf28 a2=28 a3=ffffe48eb068 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe48eac60 a2=50 a3=0 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit: BPF prog-id=99 op=LOAD May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe48eac68 a2=94 a3=5 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit: BPF prog-id=99 op=UNLOAD May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe48ead70 a2=50 a3=0 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe48eaeb8 a2=4 a3=3 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.454000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.454000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48eae98 a2=94 a3=6 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48ea668 a2=94 a3=83 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48ea668 a2=94 a3=83 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe48ec0a8 a2=10 a3=ffffe48ec198 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe48ebf68 a2=10 a3=ffffe48ec058 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe48ebed8 a2=10 a3=ffffe48ec058 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.455000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:45.455000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe48ebed8 a2=10 a3=ffffe48ec058 items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:45.469000 audit: BPF prog-id=94 op=UNLOAD May 8 00:52:45.515000 audit[2336]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:45.515000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffae57e80 a2=0 a3=ffff97534fa8 items=0 ppid=2166 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.515000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:45.526000 audit[2338]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:45.526000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc8d27850 a2=0 a3=ffff9c1b5fa8 items=0 ppid=2166 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:45.526000 audit[2339]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:45.527000 audit[2335]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:45.527000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff0095da0 a2=0 a3=ffffa271efa8 items=0 ppid=2166 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.527000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:45.526000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd03c6390 a2=0 a3=ffff821cbfa8 items=0 ppid=2166 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:45.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:46.099902 kubelet[1463]: E0508 00:52:46.099861 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:46.314261 kubelet[1463]: E0508 00:52:46.312967 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:46.329598 systemd[1]: run-containerd-runc-k8s.io-071f667a6f2271f2e4ae57b8c8a78da2eccde111ddcacd3cfef8280f4ab22d46-runc.2aMJDA.mount: Deactivated successfully. May 8 00:52:46.356023 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL May 8 00:52:47.100393 kubelet[1463]: E0508 00:52:47.100344 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:48.101300 kubelet[1463]: E0508 00:52:48.101252 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:48.151000 audit[2417]: NETFILTER_CFG table=filter:69 family=2 entries=16 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.151000 audit[2417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffebb22920 a2=0 a3=1 items=0 ppid=1658 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.162000 audit[2417]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.162000 audit[2417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffebb22920 a2=0 a3=1 items=0 ppid=1658 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.175000 audit[2419]: NETFILTER_CFG table=filter:71 family=2 entries=13 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.175000 audit[2419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdc546bc0 a2=0 a3=1 items=0 ppid=1658 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.187000 audit[2419]: NETFILTER_CFG table=nat:72 family=2 entries=35 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.187000 audit[2419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffdc546bc0 a2=0 a3=1 items=0 ppid=1658 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:49.101891 kubelet[1463]: E0508 00:52:49.101857 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:50.090577 kubelet[1463]: E0508 00:52:50.090521 1463 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:50.102937 kubelet[1463]: E0508 00:52:50.102907 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:50.166000 audit[2423]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.170461 kernel: kauditd_printk_skb: 560 callbacks suppressed May 8 00:52:50.170526 kernel: audit: type=1325 audit(1746665570.166:641): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.170552 kernel: audit: type=1300 audit(1746665570.166:641): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff8944cc0 a2=0 a3=1 items=0 ppid=1658 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.166000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff8944cc0 a2=0 a3=1 items=0 ppid=1658 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:50.175658 kernel: audit: type=1327 audit(1746665570.166:641): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:50.179000 audit[2423]: NETFILTER_CFG table=nat:74 family=2 entries=56 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.179000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff8944cc0 a2=0 a3=1 items=0 ppid=1658 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.187094 kernel: audit: type=1325 audit(1746665570.179:642): table=nat:74 family=2 entries=56 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.187167 kernel: audit: type=1300 audit(1746665570.179:642): arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff8944cc0 a2=0 a3=1 items=0 ppid=1658 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.187201 kernel: audit: type=1327 audit(1746665570.179:642): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:50.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:51.103684 kubelet[1463]: E0508 00:52:51.103495 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:51.272177 env[1219]: time="2025-05-08T00:52:51.272083386Z" level=info msg="StopPodSandbox for \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\"" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.319 [INFO][2449] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.319 [INFO][2449] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" iface="eth0" netns="/var/run/netns/cni-57398060-ae50-9d72-a57a-8cb4f0f45a2c" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.320 [INFO][2449] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" iface="eth0" netns="/var/run/netns/cni-57398060-ae50-9d72-a57a-8cb4f0f45a2c" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.320 [INFO][2449] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" iface="eth0" netns="/var/run/netns/cni-57398060-ae50-9d72-a57a-8cb4f0f45a2c" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.320 [INFO][2449] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.320 [INFO][2449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.374 [INFO][2458] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" HandleID="k8s-pod-network.5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.375 [INFO][2458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.375 [INFO][2458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.401 [WARNING][2458] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" HandleID="k8s-pod-network.5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.402 [INFO][2458] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" HandleID="k8s-pod-network.5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.403 [INFO][2458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:51.406481 env[1219]: 2025-05-08 00:52:51.405 [INFO][2449] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50" May 8 00:52:51.407102 env[1219]: time="2025-05-08T00:52:51.407067464Z" level=info msg="TearDown network for sandbox \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\" successfully" May 8 00:52:51.407182 env[1219]: time="2025-05-08T00:52:51.407166125Z" level=info msg="StopPodSandbox for \"5f715aa8db65b460fbedf652761ce6f84109d9f0cf5c96eb2af26da59818da50\" returns successfully" May 8 00:52:51.408462 systemd[1]: run-netns-cni\x2d57398060\x2dae50\x2d9d72\x2da57a\x2d8cb4f0f45a2c.mount: Deactivated successfully. May 8 00:52:51.409474 env[1219]: time="2025-05-08T00:52:51.409398617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nbwgm,Uid:04a9320f-2bb9-413d-b384-2750bc6b5d1b,Namespace:calico-system,Attempt:1,}" May 8 00:52:51.540727 systemd-networkd[1052]: cali2c9e7fcf75b: Link UP May 8 00:52:51.542791 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:52:51.542867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c9e7fcf75b: link becomes ready May 8 00:52:51.542982 systemd-networkd[1052]: cali2c9e7fcf75b: Gained carrier May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.463 [INFO][2465] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.132-k8s-csi--node--driver--nbwgm-eth0 csi-node-driver- calico-system 04a9320f-2bb9-413d-b384-2750bc6b5d1b 1006 0 2025-05-08 00:52:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.132 csi-node-driver-nbwgm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2c9e7fcf75b [] []}} ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.463 [INFO][2465] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.497 [INFO][2479] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" HandleID="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.510 [INFO][2479] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" HandleID="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003ab0d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.132", "pod":"csi-node-driver-nbwgm", "timestamp":"2025-05-08 00:52:51.497868548 +0000 UTC"}, Hostname:"10.0.0.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.510 [INFO][2479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.510 [INFO][2479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.510 [INFO][2479] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.132' May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.512 [INFO][2479] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.518 [INFO][2479] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.522 [INFO][2479] ipam/ipam.go 489: Trying affinity for 192.168.100.0/26 host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.523 [INFO][2479] ipam/ipam.go 155: Attempting to load block cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.525 [INFO][2479] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.525 [INFO][2479] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.0/26 handle="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.527 [INFO][2479] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1 May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.531 [INFO][2479] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.100.0/26 handle="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.535 [INFO][2479] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.100.1/26] block=192.168.100.0/26 handle="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.535 [INFO][2479] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.1/26] handle="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" host="10.0.0.132" May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.535 [INFO][2479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:51.553586 env[1219]: 2025-05-08 00:52:51.535 [INFO][2479] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.100.1/26] IPv6=[] ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" HandleID="k8s-pod-network.ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Workload="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.537 [INFO][2465] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-csi--node--driver--nbwgm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04a9320f-2bb9-413d-b384-2750bc6b5d1b", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"", Pod:"csi-node-driver-nbwgm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.100.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c9e7fcf75b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.537 [INFO][2465] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.100.1/32] ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.537 [INFO][2465] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2c9e7fcf75b ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.542 [INFO][2465] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.543 [INFO][2465] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-csi--node--driver--nbwgm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04a9320f-2bb9-413d-b384-2750bc6b5d1b", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1", Pod:"csi-node-driver-nbwgm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.100.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c9e7fcf75b", MAC:"d2:55:d3:f9:e8:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:51.554403 env[1219]: 2025-05-08 00:52:51.551 [INFO][2465] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1" Namespace="calico-system" Pod="csi-node-driver-nbwgm" WorkloadEndpoint="10.0.0.132-k8s-csi--node--driver--nbwgm-eth0" May 8 00:52:51.560000 audit[2498]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:51.560000 audit[2498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffff56f4bb0 a2=0 a3=ffffba835fa8 items=0 ppid=2166 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.567411 kernel: audit: type=1325 audit(1746665571.560:643): table=filter:75 family=2 entries=34 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:51.567503 kernel: audit: type=1300 audit(1746665571.560:643): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffff56f4bb0 a2=0 a3=ffffba835fa8 items=0 ppid=2166 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.567527 kernel: audit: type=1327 audit(1746665571.560:643): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:51.560000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:51.567681 env[1219]: time="2025-05-08T00:52:51.567447030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:51.567681 env[1219]: time="2025-05-08T00:52:51.567492257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:51.567681 env[1219]: time="2025-05-08T00:52:51.567502824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:51.567872 env[1219]: time="2025-05-08T00:52:51.567695102Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1 pid=2510 runtime=io.containerd.runc.v2 May 8 00:52:51.581718 systemd[1]: Started cri-containerd-ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1.scope. May 8 00:52:51.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit: BPF prog-id=100 op=LOAD May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.606958 kernel: audit: type=1400 audit(1746665571.603:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636235316534626135353261373239373432366635333630346334 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636235316534626135353261373239373432366635333630346334 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit: BPF prog-id=101 op=LOAD May 8 00:52:51.605000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636235316534626135353261373239373432366635333630346334 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit: BPF prog-id=102 op=LOAD May 8 00:52:51.605000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636235316534626135353261373239373432366635333630346334 May 8 00:52:51.605000 audit: BPF prog-id=102 op=UNLOAD May 8 00:52:51.605000 audit: BPF prog-id=101 op=UNLOAD May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.605000 audit: BPF prog-id=103 op=LOAD May 8 00:52:51.605000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636235316534626135353261373239373432366635333630346334 May 8 00:52:51.608514 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:51.622158 env[1219]: time="2025-05-08T00:52:51.622098177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nbwgm,Uid:04a9320f-2bb9-413d-b384-2750bc6b5d1b,Namespace:calico-system,Attempt:1,} returns sandbox id \"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1\"" May 8 00:52:51.625575 env[1219]: time="2025-05-08T00:52:51.623338819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:52:52.104159 kubelet[1463]: E0508 00:52:52.104070 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:52.175000 audit[2545]: NETFILTER_CFG table=filter:76 family=2 entries=10 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:52.175000 audit[2545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe57631b0 a2=0 a3=1 items=0 ppid=1658 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:52.182000 audit[2545]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:52.182000 audit[2545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe57631b0 a2=0 a3=1 items=0 ppid=1658 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:52.739175 env[1219]: time="2025-05-08T00:52:52.739117761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.740837 env[1219]: time="2025-05-08T00:52:52.740795975Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.743427 env[1219]: time="2025-05-08T00:52:52.743396225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.746502 env[1219]: time="2025-05-08T00:52:52.746458034Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.747098 env[1219]: time="2025-05-08T00:52:52.747062559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 8 00:52:52.749322 env[1219]: time="2025-05-08T00:52:52.749289423Z" level=info msg="CreateContainer within sandbox \"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:52:52.756196 systemd-networkd[1052]: cali2c9e7fcf75b: Gained IPv6LL May 8 00:52:52.805505 env[1219]: time="2025-05-08T00:52:52.805423800Z" level=info msg="CreateContainer within sandbox \"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43760e42e5216ff55ffed442523e176d737f7e4f880a3f3f8142a7262a76be56\"" May 8 00:52:52.806068 env[1219]: time="2025-05-08T00:52:52.806045496Z" level=info msg="StartContainer for \"43760e42e5216ff55ffed442523e176d737f7e4f880a3f3f8142a7262a76be56\"" May 8 00:52:52.825564 systemd[1]: Started cri-containerd-43760e42e5216ff55ffed442523e176d737f7e4f880a3f3f8142a7262a76be56.scope. May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373630653432653532313666663535666665643434323532336531 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.848000 audit: BPF prog-id=104 op=LOAD May 8 00:52:52.848000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2510 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373630653432653532313666663535666665643434323532336531 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.849000 audit: BPF prog-id=105 op=LOAD May 8 00:52:52.849000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2510 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373630653432653532313666663535666665643434323532336531 May 8 00:52:52.850000 audit: BPF prog-id=105 op=UNLOAD May 8 00:52:52.850000 audit: BPF prog-id=104 op=UNLOAD May 8 00:52:52.850000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.850000 audit: BPF prog-id=106 op=LOAD May 8 00:52:52.850000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2510 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373630653432653532313666663535666665643434323532336531 May 8 00:52:52.866956 env[1219]: time="2025-05-08T00:52:52.866068421Z" level=info msg="StartContainer for \"43760e42e5216ff55ffed442523e176d737f7e4f880a3f3f8142a7262a76be56\" returns successfully" May 8 00:52:52.869883 env[1219]: time="2025-05-08T00:52:52.869847183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:52:53.104903 kubelet[1463]: E0508 00:52:53.104756 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:53.592000 audit[2583]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:53.592000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd2d85e10 a2=0 a3=1 items=0 ppid=1658 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:53.606000 audit[2583]: NETFILTER_CFG table=nat:79 family=2 entries=27 op=nft_register_chain pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:53.606000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd2d85e10 a2=0 a3=1 items=0 ppid=1658 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:53.758863 systemd[1]: run-containerd-runc-k8s.io-43760e42e5216ff55ffed442523e176d737f7e4f880a3f3f8142a7262a76be56-runc.xgawBQ.mount: Deactivated successfully. May 8 00:52:54.106005 kubelet[1463]: E0508 00:52:54.105969 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:54.200000 audit[2585]: NETFILTER_CFG table=filter:80 family=2 entries=8 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:54.200000 audit[2585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc397a20 a2=0 a3=1 items=0 ppid=1658 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:54.210000 audit[2585]: NETFILTER_CFG table=nat:81 family=2 entries=30 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:54.210000 audit[2585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffffc397a20 a2=0 a3=1 items=0 ppid=1658 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:54.272950 env[1219]: time="2025-05-08T00:52:54.272893050Z" level=info msg="StopPodSandbox for \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\"" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.311 [INFO][2604] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.312 [INFO][2604] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" iface="eth0" netns="/var/run/netns/cni-b84acbb0-1a06-d898-d996-cda209d1cf1a" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.312 [INFO][2604] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" iface="eth0" netns="/var/run/netns/cni-b84acbb0-1a06-d898-d996-cda209d1cf1a" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.312 [INFO][2604] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" iface="eth0" netns="/var/run/netns/cni-b84acbb0-1a06-d898-d996-cda209d1cf1a" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.312 [INFO][2604] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.312 [INFO][2604] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.330 [INFO][2613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" HandleID="k8s-pod-network.cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.330 [INFO][2613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.330 [INFO][2613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.339 [WARNING][2613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" HandleID="k8s-pod-network.cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.339 [INFO][2613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" HandleID="k8s-pod-network.cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.341 [INFO][2613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:54.343812 env[1219]: 2025-05-08 00:52:54.342 [INFO][2604] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6" May 8 00:52:54.345565 systemd[1]: run-netns-cni\x2db84acbb0\x2d1a06\x2dd898\x2dd996\x2dcda209d1cf1a.mount: Deactivated successfully. May 8 00:52:54.346332 env[1219]: time="2025-05-08T00:52:54.345697192Z" level=info msg="TearDown network for sandbox \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\" successfully" May 8 00:52:54.346376 env[1219]: time="2025-05-08T00:52:54.346329227Z" level=info msg="StopPodSandbox for \"cceab563ab7eb71ac3ff6a62fb3110276a3506a6bcd23fb56879e007c8f156a6\" returns successfully" May 8 00:52:54.346936 env[1219]: time="2025-05-08T00:52:54.346894225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9hshn,Uid:a070d2c9-4364-45fa-a528-0ff2afd73d6a,Namespace:default,Attempt:1,}" May 8 00:52:54.412437 env[1219]: time="2025-05-08T00:52:54.411816299Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.413243 env[1219]: time="2025-05-08T00:52:54.413214965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.414907 env[1219]: time="2025-05-08T00:52:54.414859449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.416546 env[1219]: time="2025-05-08T00:52:54.416514779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 8 00:52:54.417174 env[1219]: time="2025-05-08T00:52:54.417128724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.418793 env[1219]: time="2025-05-08T00:52:54.418765763Z" level=info msg="CreateContainer within sandbox \"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:52:54.434287 env[1219]: time="2025-05-08T00:52:54.434246941Z" level=info msg="CreateContainer within sandbox \"ddcb51e4ba552a7297426f53604c42dc8e3283afe9885978fac1232a6b38d1f1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7c28c802945b4c0b35f084640d9d57327fe64e22a4a5f5ff45dad9c61c8f4b73\"" May 8 00:52:54.435116 env[1219]: time="2025-05-08T00:52:54.435090335Z" level=info msg="StartContainer for \"7c28c802945b4c0b35f084640d9d57327fe64e22a4a5f5ff45dad9c61c8f4b73\"" May 8 00:52:54.451445 systemd[1]: Started cri-containerd-7c28c802945b4c0b35f084640d9d57327fe64e22a4a5f5ff45dad9c61c8f4b73.scope. May 8 00:52:54.464419 systemd-networkd[1052]: calia90d49fe63a: Link UP May 8 00:52:54.466845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:52:54.466904 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia90d49fe63a: link becomes ready May 8 00:52:54.466714 systemd-networkd[1052]: calia90d49fe63a: Gained carrier May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.389 [INFO][2621] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0 nginx-deployment-85f456d6dd- default a070d2c9-4364-45fa-a528-0ff2afd73d6a 1051 0 2025-05-08 00:52:41 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.132 nginx-deployment-85f456d6dd-9hshn eth0 default [] [] [kns.default ksa.default.default] calia90d49fe63a [] []}} ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.389 [INFO][2621] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.414 [INFO][2636] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" HandleID="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.427 [INFO][2636] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" HandleID="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d92c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.132", "pod":"nginx-deployment-85f456d6dd-9hshn", "timestamp":"2025-05-08 00:52:54.414213366 +0000 UTC"}, Hostname:"10.0.0.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.427 [INFO][2636] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.427 [INFO][2636] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.427 [INFO][2636] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.132' May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.430 [INFO][2636] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.436 [INFO][2636] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.441 [INFO][2636] ipam/ipam.go 489: Trying affinity for 192.168.100.0/26 host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.443 [INFO][2636] ipam/ipam.go 155: Attempting to load block cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.445 [INFO][2636] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.445 [INFO][2636] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.0/26 handle="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.446 [INFO][2636] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.454 [INFO][2636] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.100.0/26 handle="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.460 [INFO][2636] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.100.2/26] block=192.168.100.0/26 handle="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.460 [INFO][2636] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.2/26] handle="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" host="10.0.0.132" May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.460 [INFO][2636] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:54.480654 env[1219]: 2025-05-08 00:52:54.460 [INFO][2636] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.100.2/26] IPv6=[] ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" HandleID="k8s-pod-network.58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Workload="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.462 [INFO][2621] cni-plugin/k8s.go 386: Populated endpoint ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a070d2c9-4364-45fa-a528-0ff2afd73d6a", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-9hshn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia90d49fe63a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.462 [INFO][2621] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.100.2/32] ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.462 [INFO][2621] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia90d49fe63a ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.467 [INFO][2621] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.472 [INFO][2621] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a070d2c9-4364-45fa-a528-0ff2afd73d6a", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed", Pod:"nginx-deployment-85f456d6dd-9hshn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia90d49fe63a", MAC:"62:71:a5:13:69:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:54.481370 env[1219]: 2025-05-08 00:52:54.477 [INFO][2621] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed" Namespace="default" Pod="nginx-deployment-85f456d6dd-9hshn" WorkloadEndpoint="10.0.0.132-k8s-nginx--deployment--85f456d6dd--9hshn-eth0" May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323863383032393435623463306233356630383436343064396435 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.481000 audit: BPF prog-id=107 op=LOAD May 8 00:52:54.481000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2510 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323863383032393435623463306233356630383436343064396435 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.482000 audit: BPF prog-id=108 op=LOAD May 8 00:52:54.482000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2510 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323863383032393435623463306233356630383436343064396435 May 8 00:52:54.483000 audit: BPF prog-id=108 op=UNLOAD May 8 00:52:54.483000 audit: BPF prog-id=107 op=UNLOAD May 8 00:52:54.483000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.483000 audit: BPF prog-id=109 op=LOAD May 8 00:52:54.483000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2510 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323863383032393435623463306233356630383436343064396435 May 8 00:52:54.486000 audit[2679]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:54.486000 audit[2679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffeb9ba030 a2=0 a3=ffff91ea6fa8 items=0 ppid=2166 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:54.499584 env[1219]: time="2025-05-08T00:52:54.497746936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:54.499584 env[1219]: time="2025-05-08T00:52:54.497800366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:54.499584 env[1219]: time="2025-05-08T00:52:54.497811373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:54.499584 env[1219]: time="2025-05-08T00:52:54.497965699Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed pid=2702 runtime=io.containerd.runc.v2 May 8 00:52:54.499584 env[1219]: time="2025-05-08T00:52:54.498438565Z" level=info msg="StartContainer for \"7c28c802945b4c0b35f084640d9d57327fe64e22a4a5f5ff45dad9c61c8f4b73\" returns successfully" May 8 00:52:54.508463 systemd[1]: Started cri-containerd-58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed.scope. May 8 00:52:54.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.547000 audit: BPF prog-id=110 op=LOAD May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2702 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538663530343938343566343437633638663565346661613333313235 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2702 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538663530343938343566343437633638663565346661613333313235 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit: BPF prog-id=111 op=LOAD May 8 00:52:54.548000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2702 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538663530343938343566343437633638663565346661613333313235 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit: BPF prog-id=112 op=LOAD May 8 00:52:54.548000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2702 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538663530343938343566343437633638663565346661613333313235 May 8 00:52:54.548000 audit: BPF prog-id=112 op=UNLOAD May 8 00:52:54.548000 audit: BPF prog-id=111 op=UNLOAD May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.548000 audit: BPF prog-id=113 op=LOAD May 8 00:52:54.548000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2702 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538663530343938343566343437633638663565346661613333313235 May 8 00:52:54.550076 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:54.567474 env[1219]: time="2025-05-08T00:52:54.567423042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9hshn,Uid:a070d2c9-4364-45fa-a528-0ff2afd73d6a,Namespace:default,Attempt:1,} returns sandbox id \"58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed\"" May 8 00:52:54.569299 env[1219]: time="2025-05-08T00:52:54.569260354Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 8 00:52:55.106179 kubelet[1463]: E0508 00:52:55.106121 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:55.232595 kubelet[1463]: I0508 00:52:55.232331 1463 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:52:55.232595 kubelet[1463]: I0508 00:52:55.232362 1463 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:52:55.344953 kubelet[1463]: I0508 00:52:55.344886 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-nbwgm" podStartSLOduration=22.550683088 podStartE2EDuration="25.344871466s" podCreationTimestamp="2025-05-08 00:52:30 +0000 UTC" firstStartedPulling="2025-05-08 00:52:51.623160029 +0000 UTC m=+22.949074666" lastFinishedPulling="2025-05-08 00:52:54.417348367 +0000 UTC m=+25.743263044" observedRunningTime="2025-05-08 00:52:55.344611448 +0000 UTC m=+26.670526125" watchObservedRunningTime="2025-05-08 00:52:55.344871466 +0000 UTC m=+26.670786103" May 8 00:52:55.956592 systemd-networkd[1052]: calia90d49fe63a: Gained IPv6LL May 8 00:52:56.106796 kubelet[1463]: E0508 00:52:56.106747 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:56.628976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1059933549.mount: Deactivated successfully. May 8 00:52:57.107633 kubelet[1463]: E0508 00:52:57.107584 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:57.795939 env[1219]: time="2025-05-08T00:52:57.795874232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.797820 env[1219]: time="2025-05-08T00:52:57.797767371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.799157 env[1219]: time="2025-05-08T00:52:57.799125535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.801069 env[1219]: time="2025-05-08T00:52:57.801040124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.801810 env[1219]: time="2025-05-08T00:52:57.801756744Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 8 00:52:57.804322 env[1219]: time="2025-05-08T00:52:57.804289546Z" level=info msg="CreateContainer within sandbox \"58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 8 00:52:57.814068 env[1219]: time="2025-05-08T00:52:57.814015562Z" level=info msg="CreateContainer within sandbox \"58f5049845f447c68f5e4faa33125e6811cba7eac3dd25b79c7d4c49d520eaed\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"058824768f249f75c40a2f0bfc321970397d3c852d87c8c9c479042bc69711ef\"" May 8 00:52:57.814748 env[1219]: time="2025-05-08T00:52:57.814720177Z" level=info msg="StartContainer for \"058824768f249f75c40a2f0bfc321970397d3c852d87c8c9c479042bc69711ef\"" May 8 00:52:57.835961 systemd[1]: Started cri-containerd-058824768f249f75c40a2f0bfc321970397d3c852d87c8c9c479042bc69711ef.scope. May 8 00:52:57.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871718 kernel: kauditd_printk_skb: 220 callbacks suppressed May 8 00:52:57.871779 kernel: audit: type=1400 audit(1746665577.869:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876791 kernel: audit: type=1400 audit(1746665577.869:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876874 kernel: audit: type=1400 audit(1746665577.869:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.882354 kernel: audit: type=1400 audit(1746665577.870:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.882434 kernel: audit: type=1400 audit(1746665577.870:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.887236 kernel: audit: type=1400 audit(1746665577.870:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.887304 kernel: audit: type=1400 audit(1746665577.870:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.891951 kernel: audit: type=1400 audit(1746665577.870:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.894809 kernel: audit: type=1400 audit(1746665577.870:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.897234 kernel: audit: type=1400 audit(1746665577.870:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.870000 audit: BPF prog-id=114 op=LOAD May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383832343736386632343966373563343061326630626663333231 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383832343736386632343966373563343061326630626663333231 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.871000 audit: BPF prog-id=115 op=LOAD May 8 00:52:57.871000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383832343736386632343966373563343061326630626663333231 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.873000 audit: BPF prog-id=116 op=LOAD May 8 00:52:57.873000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383832343736386632343966373563343061326630626663333231 May 8 00:52:57.875000 audit: BPF prog-id=116 op=UNLOAD May 8 00:52:57.875000 audit: BPF prog-id=115 op=UNLOAD May 8 00:52:57.876000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:57.876000 audit: BPF prog-id=117 op=LOAD May 8 00:52:57.876000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383832343736386632343966373563343061326630626663333231 May 8 00:52:57.988427 env[1219]: time="2025-05-08T00:52:57.988376994Z" level=info msg="StartContainer for \"058824768f249f75c40a2f0bfc321970397d3c852d87c8c9c479042bc69711ef\" returns successfully" May 8 00:52:58.108184 kubelet[1463]: E0508 00:52:58.108061 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:52:58.345876 kubelet[1463]: I0508 00:52:58.345803 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-9hshn" podStartSLOduration=14.111464955 podStartE2EDuration="17.345785899s" podCreationTimestamp="2025-05-08 00:52:41 +0000 UTC" firstStartedPulling="2025-05-08 00:52:54.568711846 +0000 UTC m=+25.894626523" lastFinishedPulling="2025-05-08 00:52:57.80303279 +0000 UTC m=+29.128947467" observedRunningTime="2025-05-08 00:52:58.345226808 +0000 UTC m=+29.671141445" watchObservedRunningTime="2025-05-08 00:52:58.345785899 +0000 UTC m=+29.671700576" May 8 00:52:58.812307 systemd[1]: run-containerd-runc-k8s.io-058824768f249f75c40a2f0bfc321970397d3c852d87c8c9c479042bc69711ef-runc.Vu4N8A.mount: Deactivated successfully. May 8 00:52:59.108753 kubelet[1463]: E0508 00:52:59.108626 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:00.108888 kubelet[1463]: E0508 00:53:00.108845 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:01.109562 kubelet[1463]: E0508 00:53:01.109511 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:02.110410 kubelet[1463]: E0508 00:53:02.110370 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:03.110646 kubelet[1463]: E0508 00:53:03.110600 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:04.111599 kubelet[1463]: E0508 00:53:04.111549 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:04.457000 audit[2811]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.458960 kernel: kauditd_printk_skb: 47 callbacks suppressed May 8 00:53:04.459020 kernel: audit: type=1325 audit(1746665584.457:717): table=filter:83 family=2 entries=20 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.457000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeca60c10 a2=0 a3=1 items=0 ppid=1658 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.464493 kernel: audit: type=1300 audit(1746665584.457:717): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeca60c10 a2=0 a3=1 items=0 ppid=1658 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.464578 kernel: audit: type=1327 audit(1746665584.457:717): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.467000 audit[2811]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.467000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeca60c10 a2=0 a3=1 items=0 ppid=1658 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.474376 kernel: audit: type=1325 audit(1746665584.467:718): table=nat:84 family=2 entries=22 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.474429 kernel: audit: type=1300 audit(1746665584.467:718): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeca60c10 a2=0 a3=1 items=0 ppid=1658 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.474463 kernel: audit: type=1327 audit(1746665584.467:718): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.484000 audit[2813]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.484000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffda6b2840 a2=0 a3=1 items=0 ppid=1658 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.490652 kernel: audit: type=1325 audit(1746665584.484:719): table=filter:85 family=2 entries=32 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.490692 kernel: audit: type=1300 audit(1746665584.484:719): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffda6b2840 a2=0 a3=1 items=0 ppid=1658 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.490711 kernel: audit: type=1327 audit(1746665584.484:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.493000 audit[2813]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.493000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffda6b2840 a2=0 a3=1 items=0 ppid=1658 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.496952 kernel: audit: type=1325 audit(1746665584.493:720): table=nat:86 family=2 entries=22 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.510200 kubelet[1463]: I0508 00:53:04.510158 1463 topology_manager.go:215] "Topology Admit Handler" podUID="b9b80ff7-54b6-4631-9f5e-467bbe8c148c" podNamespace="default" podName="nfs-server-provisioner-0" May 8 00:53:04.514765 systemd[1]: Created slice kubepods-besteffort-podb9b80ff7_54b6_4631_9f5e_467bbe8c148c.slice. May 8 00:53:04.527661 kubelet[1463]: I0508 00:53:04.527607 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/b9b80ff7-54b6-4631-9f5e-467bbe8c148c-data\") pod \"nfs-server-provisioner-0\" (UID: \"b9b80ff7-54b6-4631-9f5e-467bbe8c148c\") " pod="default/nfs-server-provisioner-0" May 8 00:53:04.527661 kubelet[1463]: I0508 00:53:04.527651 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2frn2\" (UniqueName: \"kubernetes.io/projected/b9b80ff7-54b6-4631-9f5e-467bbe8c148c-kube-api-access-2frn2\") pod \"nfs-server-provisioner-0\" (UID: \"b9b80ff7-54b6-4631-9f5e-467bbe8c148c\") " pod="default/nfs-server-provisioner-0" May 8 00:53:04.817667 env[1219]: time="2025-05-08T00:53:04.817540280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b9b80ff7-54b6-4631-9f5e-467bbe8c148c,Namespace:default,Attempt:0,}" May 8 00:53:04.954691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:53:04.954846 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 8 00:53:04.953225 systemd-networkd[1052]: cali60e51b789ff: Link UP May 8 00:53:04.955732 systemd-networkd[1052]: cali60e51b789ff: Gained carrier May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.880 [INFO][2817] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.132-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default b9b80ff7-54b6-4631-9f5e-467bbe8c148c 1118 0 2025-05-08 00:53:04 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.132 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.880 [INFO][2817] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.912 [INFO][2832] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" HandleID="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Workload="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.925 [INFO][2832] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" HandleID="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Workload="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d580), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.132", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-08 00:53:04.912321233 +0000 UTC"}, Hostname:"10.0.0.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.925 [INFO][2832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.925 [INFO][2832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.925 [INFO][2832] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.132' May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.927 [INFO][2832] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.931 [INFO][2832] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.935 [INFO][2832] ipam/ipam.go 489: Trying affinity for 192.168.100.0/26 host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.937 [INFO][2832] ipam/ipam.go 155: Attempting to load block cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.939 [INFO][2832] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.939 [INFO][2832] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.0/26 handle="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.941 [INFO][2832] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208 May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.944 [INFO][2832] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.100.0/26 handle="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.949 [INFO][2832] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.100.3/26] block=192.168.100.0/26 handle="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.949 [INFO][2832] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.3/26] handle="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" host="10.0.0.132" May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.950 [INFO][2832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:04.969488 env[1219]: 2025-05-08 00:53:04.950 [INFO][2832] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.100.3/26] IPv6=[] ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" HandleID="k8s-pod-network.36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Workload="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.970278 env[1219]: 2025-05-08 00:53:04.951 [INFO][2817] cni-plugin/k8s.go 386: Populated endpoint ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b9b80ff7-54b6-4631-9f5e-467bbe8c148c", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.100.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:04.970278 env[1219]: 2025-05-08 00:53:04.951 [INFO][2817] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.100.3/32] ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.970278 env[1219]: 2025-05-08 00:53:04.951 [INFO][2817] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.970278 env[1219]: 2025-05-08 00:53:04.954 [INFO][2817] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.970429 env[1219]: 2025-05-08 00:53:04.956 [INFO][2817] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b9b80ff7-54b6-4631-9f5e-467bbe8c148c", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.100.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ca:c2:1f:c4:d0:ae", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:04.970429 env[1219]: 2025-05-08 00:53:04.967 [INFO][2817] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.132-k8s-nfs--server--provisioner--0-eth0" May 8 00:53:04.976000 audit[2857]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:04.976000 audit[2857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffc7a50030 a2=0 a3=ffffb73abfa8 items=0 ppid=2166 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.976000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:05.003656 env[1219]: time="2025-05-08T00:53:05.003561149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:05.003656 env[1219]: time="2025-05-08T00:53:05.003612045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:05.003844 env[1219]: time="2025-05-08T00:53:05.003630611Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:05.003844 env[1219]: time="2025-05-08T00:53:05.003765532Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208 pid=2867 runtime=io.containerd.runc.v2 May 8 00:53:05.017295 systemd[1]: Started cri-containerd-36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208.scope. May 8 00:53:05.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.059000 audit: BPF prog-id=118 op=LOAD May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2867 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:05.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653035646263303237623135373566626564336232383763323464 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2867 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:05.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653035646263303237623135373566626564336232383763323464 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit: BPF prog-id=119 op=LOAD May 8 00:53:05.060000 audit[2877]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2867 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:05.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653035646263303237623135373566626564336232383763323464 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit: BPF prog-id=120 op=LOAD May 8 00:53:05.060000 audit[2877]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2867 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:05.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653035646263303237623135373566626564336232383763323464 May 8 00:53:05.060000 audit: BPF prog-id=120 op=UNLOAD May 8 00:53:05.060000 audit: BPF prog-id=119 op=UNLOAD May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:05.060000 audit: BPF prog-id=121 op=LOAD May 8 00:53:05.060000 audit[2877]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2867 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:05.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653035646263303237623135373566626564336232383763323464 May 8 00:53:05.061861 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:05.077612 env[1219]: time="2025-05-08T00:53:05.077515628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b9b80ff7-54b6-4631-9f5e-467bbe8c148c,Namespace:default,Attempt:0,} returns sandbox id \"36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208\"" May 8 00:53:05.080532 env[1219]: time="2025-05-08T00:53:05.080501194Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 8 00:53:05.112164 kubelet[1463]: E0508 00:53:05.112120 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:05.983595 update_engine[1210]: I0508 00:53:05.983407 1210 update_attempter.cc:509] Updating boot flags... May 8 00:53:06.112426 kubelet[1463]: E0508 00:53:06.112364 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:06.772081 systemd-networkd[1052]: cali60e51b789ff: Gained IPv6LL May 8 00:53:07.113426 kubelet[1463]: E0508 00:53:07.113186 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:07.292115 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1090670825.mount: Deactivated successfully. May 8 00:53:08.113723 kubelet[1463]: E0508 00:53:08.113650 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:09.013935 env[1219]: time="2025-05-08T00:53:09.013873873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:09.015186 env[1219]: time="2025-05-08T00:53:09.015158240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:09.016687 env[1219]: time="2025-05-08T00:53:09.016653261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:09.019013 env[1219]: time="2025-05-08T00:53:09.018982533Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:09.019836 env[1219]: time="2025-05-08T00:53:09.019807583Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 8 00:53:09.022340 env[1219]: time="2025-05-08T00:53:09.022310980Z" level=info msg="CreateContainer within sandbox \"36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 8 00:53:09.032502 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1532225973.mount: Deactivated successfully. May 8 00:53:09.038109 env[1219]: time="2025-05-08T00:53:09.038054666Z" level=info msg="CreateContainer within sandbox \"36e05dbc027b1575fbed3b287c24dbecb64f6b310e9ea5f2b0c6cde8183d4208\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7ada2fab142931e69b822a5a762e8ab6ed5af251f149b652b1c63b5554889f49\"" May 8 00:53:09.038471 env[1219]: time="2025-05-08T00:53:09.038431762Z" level=info msg="StartContainer for \"7ada2fab142931e69b822a5a762e8ab6ed5af251f149b652b1c63b5554889f49\"" May 8 00:53:09.053521 systemd[1]: Started cri-containerd-7ada2fab142931e69b822a5a762e8ab6ed5af251f149b652b1c63b5554889f49.scope. May 8 00:53:09.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.089000 audit: BPF prog-id=122 op=LOAD May 8 00:53:09.090000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.090000 audit[2926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2867 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646132666162313432393331653639623832326135613736326538 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2867 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646132666162313432393331653639623832326135613736326538 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit: BPF prog-id=123 op=LOAD May 8 00:53:09.091000 audit[2926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2867 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646132666162313432393331653639623832326135613736326538 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit: BPF prog-id=124 op=LOAD May 8 00:53:09.091000 audit[2926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2867 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646132666162313432393331653639623832326135613736326538 May 8 00:53:09.091000 audit: BPF prog-id=124 op=UNLOAD May 8 00:53:09.091000 audit: BPF prog-id=123 op=UNLOAD May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:09.091000 audit: BPF prog-id=125 op=LOAD May 8 00:53:09.091000 audit[2926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2867 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646132666162313432393331653639623832326135613736326538 May 8 00:53:09.115691 kubelet[1463]: E0508 00:53:09.115615 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:09.188606 env[1219]: time="2025-05-08T00:53:09.188540118Z" level=info msg="StartContainer for \"7ada2fab142931e69b822a5a762e8ab6ed5af251f149b652b1c63b5554889f49\" returns successfully" May 8 00:53:09.240000 audit[2955]: AVC avc: denied { search } for pid=2955 comm="rpcbind" name="crypto" dev="proc" ino=18532 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:53:09.240000 audit[2955]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9812f000 a2=0 a3=0 items=0 ppid=2937 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 key=(null) May 8 00:53:09.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 8 00:53:09.274000 audit[2960]: AVC avc: denied { search } for pid=2960 comm="dbus-daemon" name="crypto" dev="proc" ino=18532 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:53:09.274000 audit[2960]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff81c5f000 a2=0 a3=0 items=0 ppid=2937 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 key=(null) May 8 00:53:09.274000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 8 00:53:09.284000 audit[2961]: AVC avc: denied { watch } for pid=2961 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c353,c681 tclass=dir permissive=0 May 8 00:53:09.284000 audit[2961]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae6b7ad90 a2=2c8 a3=aaaae6b76a60 items=0 ppid=2937 pid=2961 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 key=(null) May 8 00:53:09.284000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 8 00:53:09.291000 audit[2962]: AVC avc: denied { read } for pid=2962 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20522 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 8 00:53:09.291000 audit[2962]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa3fba570 a2=80000 a3=0 items=0 ppid=2937 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 key=(null) May 8 00:53:09.291000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 8 00:53:09.295000 audit[2962]: AVC avc: denied { search } for pid=2962 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18532 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:53:09.295000 audit[2962]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa334f000 a2=0 a3=0 items=0 ppid=2937 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c681 key=(null) May 8 00:53:09.295000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 8 00:53:09.363850 kubelet[1463]: I0508 00:53:09.363710 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.423010616 podStartE2EDuration="5.363695967s" podCreationTimestamp="2025-05-08 00:53:04 +0000 UTC" firstStartedPulling="2025-05-08 00:53:05.080312695 +0000 UTC m=+36.406227372" lastFinishedPulling="2025-05-08 00:53:09.020998046 +0000 UTC m=+40.346912723" observedRunningTime="2025-05-08 00:53:09.363289144 +0000 UTC m=+40.689203821" watchObservedRunningTime="2025-05-08 00:53:09.363695967 +0000 UTC m=+40.689610604" May 8 00:53:09.372000 audit[2980]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.372000 audit[2980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd6ba4ea0 a2=0 a3=1 items=0 ppid=1658 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:09.387000 audit[2980]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.387000 audit[2980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd6ba4ea0 a2=0 a3=1 items=0 ppid=1658 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:10.090788 kubelet[1463]: E0508 00:53:10.090746 1463 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:10.116291 kubelet[1463]: E0508 00:53:10.116259 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:11.116780 kubelet[1463]: E0508 00:53:11.116739 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:12.117679 kubelet[1463]: E0508 00:53:12.117641 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:12.919000 audit[2986]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.921461 kernel: kauditd_printk_skb: 140 callbacks suppressed May 8 00:53:12.921518 kernel: audit: type=1325 audit(1746665592.919:765): table=filter:90 family=2 entries=8 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.919000 audit[2986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc858c150 a2=0 a3=1 items=0 ppid=1658 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.926860 kernel: audit: type=1300 audit(1746665592.919:765): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc858c150 a2=0 a3=1 items=0 ppid=1658 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.926909 kernel: audit: type=1327 audit(1746665592.919:765): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:12.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:12.932000 audit[2986]: NETFILTER_CFG table=nat:91 family=2 entries=58 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.932000 audit[2986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc858c150 a2=0 a3=1 items=0 ppid=1658 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.939114 kernel: audit: type=1325 audit(1746665592.932:766): table=nat:91 family=2 entries=58 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.939152 kernel: audit: type=1300 audit(1746665592.932:766): arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc858c150 a2=0 a3=1 items=0 ppid=1658 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.939168 kernel: audit: type=1327 audit(1746665592.932:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:12.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:13.118828 kubelet[1463]: E0508 00:53:13.118778 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:14.119617 kubelet[1463]: E0508 00:53:14.119569 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:15.119891 kubelet[1463]: E0508 00:53:15.119842 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:16.120488 kubelet[1463]: E0508 00:53:16.120438 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:16.276085 kubelet[1463]: E0508 00:53:16.276047 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:17.120757 kubelet[1463]: E0508 00:53:17.120706 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:18.121629 kubelet[1463]: E0508 00:53:18.121592 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:18.935124 kubelet[1463]: I0508 00:53:18.934357 1463 topology_manager.go:215] "Topology Admit Handler" podUID="d9f117f3-9205-4f47-838d-9d77d0312d7c" podNamespace="default" podName="test-pod-1" May 8 00:53:18.941875 systemd[1]: Created slice kubepods-besteffort-podd9f117f3_9205_4f47_838d_9d77d0312d7c.slice. May 8 00:53:19.103443 kubelet[1463]: I0508 00:53:19.103403 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8f511d08-f04a-4ab9-8933-cbabee138293\" (UniqueName: \"kubernetes.io/nfs/d9f117f3-9205-4f47-838d-9d77d0312d7c-pvc-8f511d08-f04a-4ab9-8933-cbabee138293\") pod \"test-pod-1\" (UID: \"d9f117f3-9205-4f47-838d-9d77d0312d7c\") " pod="default/test-pod-1" May 8 00:53:19.103746 kubelet[1463]: I0508 00:53:19.103721 1463 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gtf4p\" (UniqueName: \"kubernetes.io/projected/d9f117f3-9205-4f47-838d-9d77d0312d7c-kube-api-access-gtf4p\") pod \"test-pod-1\" (UID: \"d9f117f3-9205-4f47-838d-9d77d0312d7c\") " pod="default/test-pod-1" May 8 00:53:19.122553 kubelet[1463]: E0508 00:53:19.122496 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:19.221000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.226556 kernel: Failed to create system directory netfs May 8 00:53:19.226653 kernel: audit: type=1400 audit(1746665599.221:767): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.226676 kernel: Failed to create system directory netfs May 8 00:53:19.226693 kernel: audit: type=1400 audit(1746665599.221:767): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.221000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.229530 kernel: Failed to create system directory netfs May 8 00:53:19.229596 kernel: audit: type=1400 audit(1746665599.221:767): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.221000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.232562 kernel: Failed to create system directory netfs May 8 00:53:19.232622 kernel: audit: type=1400 audit(1746665599.221:767): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.221000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.221000 audit[3015]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacda875e0 a1=12c14 a2=aaaac6f6e028 a3=aaaacda78010 items=0 ppid=82 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.239162 kernel: audit: type=1300 audit(1746665599.221:767): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacda875e0 a1=12c14 a2=aaaac6f6e028 a3=aaaacda78010 items=0 ppid=82 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.239227 kernel: audit: type=1327 audit(1746665599.221:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:53:19.221000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.244623 kernel: Failed to create system directory fscache May 8 00:53:19.244669 kernel: audit: type=1400 audit(1746665599.235:768): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.244691 kernel: Failed to create system directory fscache May 8 00:53:19.244706 kernel: audit: type=1400 audit(1746665599.235:768): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.247840 kernel: Failed to create system directory fscache May 8 00:53:19.247907 kernel: audit: type=1400 audit(1746665599.235:768): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.251047 kernel: Failed to create system directory fscache May 8 00:53:19.251087 kernel: audit: type=1400 audit(1746665599.235:768): avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.254242 kernel: Failed to create system directory fscache May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.254955 kernel: Failed to create system directory fscache May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.256015 kernel: Failed to create system directory fscache May 8 00:53:19.256045 kernel: Failed to create system directory fscache May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.257172 kernel: Failed to create system directory fscache May 8 00:53:19.257209 kernel: Failed to create system directory fscache May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.258358 kernel: Failed to create system directory fscache May 8 00:53:19.258379 kernel: Failed to create system directory fscache May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.235000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.260174 kernel: Failed to create system directory fscache May 8 00:53:19.260202 kernel: Failed to create system directory fscache May 8 00:53:19.262957 kernel: FS-Cache: Loaded May 8 00:53:19.235000 audit[3015]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacdc9a210 a1=4c344 a2=aaaac6f6e028 a3=aaaacda78010 items=0 ppid=82 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.235000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.284248 kernel: Failed to create system directory sunrpc May 8 00:53:19.284302 kernel: Failed to create system directory sunrpc May 8 00:53:19.284323 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.285443 kernel: Failed to create system directory sunrpc May 8 00:53:19.285472 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.287141 kernel: Failed to create system directory sunrpc May 8 00:53:19.287162 kernel: Failed to create system directory sunrpc May 8 00:53:19.287188 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.288299 kernel: Failed to create system directory sunrpc May 8 00:53:19.288328 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.289495 kernel: Failed to create system directory sunrpc May 8 00:53:19.289523 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.291410 kernel: Failed to create system directory sunrpc May 8 00:53:19.291437 kernel: Failed to create system directory sunrpc May 8 00:53:19.291460 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.293197 kernel: Failed to create system directory sunrpc May 8 00:53:19.293242 kernel: Failed to create system directory sunrpc May 8 00:53:19.293259 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.294397 kernel: Failed to create system directory sunrpc May 8 00:53:19.294422 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.296192 kernel: Failed to create system directory sunrpc May 8 00:53:19.296230 kernel: Failed to create system directory sunrpc May 8 00:53:19.296249 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.297398 kernel: Failed to create system directory sunrpc May 8 00:53:19.297429 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.299213 kernel: Failed to create system directory sunrpc May 8 00:53:19.299237 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.300455 kernel: Failed to create system directory sunrpc May 8 00:53:19.300503 kernel: Failed to create system directory sunrpc May 8 00:53:19.300545 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.302236 kernel: Failed to create system directory sunrpc May 8 00:53:19.302265 kernel: Failed to create system directory sunrpc May 8 00:53:19.302286 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.303410 kernel: Failed to create system directory sunrpc May 8 00:53:19.303442 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.305183 kernel: Failed to create system directory sunrpc May 8 00:53:19.305215 kernel: Failed to create system directory sunrpc May 8 00:53:19.305243 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.306374 kernel: Failed to create system directory sunrpc May 8 00:53:19.306410 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.308159 kernel: Failed to create system directory sunrpc May 8 00:53:19.308197 kernel: Failed to create system directory sunrpc May 8 00:53:19.308214 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.309348 kernel: Failed to create system directory sunrpc May 8 00:53:19.309376 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.311131 kernel: Failed to create system directory sunrpc May 8 00:53:19.311170 kernel: Failed to create system directory sunrpc May 8 00:53:19.311188 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.312300 kernel: Failed to create system directory sunrpc May 8 00:53:19.312335 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.313502 kernel: Failed to create system directory sunrpc May 8 00:53:19.313531 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.315290 kernel: Failed to create system directory sunrpc May 8 00:53:19.315327 kernel: Failed to create system directory sunrpc May 8 00:53:19.315344 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.316474 kernel: Failed to create system directory sunrpc May 8 00:53:19.316510 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.318248 kernel: Failed to create system directory sunrpc May 8 00:53:19.318276 kernel: Failed to create system directory sunrpc May 8 00:53:19.318290 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.319444 kernel: Failed to create system directory sunrpc May 8 00:53:19.319477 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.321211 kernel: Failed to create system directory sunrpc May 8 00:53:19.321300 kernel: Failed to create system directory sunrpc May 8 00:53:19.321319 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.322393 kernel: Failed to create system directory sunrpc May 8 00:53:19.322422 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.324173 kernel: Failed to create system directory sunrpc May 8 00:53:19.324201 kernel: Failed to create system directory sunrpc May 8 00:53:19.324222 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.325343 kernel: Failed to create system directory sunrpc May 8 00:53:19.325370 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.327131 kernel: Failed to create system directory sunrpc May 8 00:53:19.327154 kernel: Failed to create system directory sunrpc May 8 00:53:19.327168 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.328325 kernel: Failed to create system directory sunrpc May 8 00:53:19.328362 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.329537 kernel: Failed to create system directory sunrpc May 8 00:53:19.329568 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.331325 kernel: Failed to create system directory sunrpc May 8 00:53:19.331350 kernel: Failed to create system directory sunrpc May 8 00:53:19.331364 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.332524 kernel: Failed to create system directory sunrpc May 8 00:53:19.332559 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.334324 kernel: Failed to create system directory sunrpc May 8 00:53:19.334361 kernel: Failed to create system directory sunrpc May 8 00:53:19.334378 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.335515 kernel: Failed to create system directory sunrpc May 8 00:53:19.335548 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.337293 kernel: Failed to create system directory sunrpc May 8 00:53:19.337324 kernel: Failed to create system directory sunrpc May 8 00:53:19.337348 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.338456 kernel: Failed to create system directory sunrpc May 8 00:53:19.338482 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.340236 kernel: Failed to create system directory sunrpc May 8 00:53:19.340263 kernel: Failed to create system directory sunrpc May 8 00:53:19.340277 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.341421 kernel: Failed to create system directory sunrpc May 8 00:53:19.341456 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.343191 kernel: Failed to create system directory sunrpc May 8 00:53:19.343223 kernel: Failed to create system directory sunrpc May 8 00:53:19.343244 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.344382 kernel: Failed to create system directory sunrpc May 8 00:53:19.344413 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.346174 kernel: Failed to create system directory sunrpc May 8 00:53:19.346199 kernel: Failed to create system directory sunrpc May 8 00:53:19.346222 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.347366 kernel: Failed to create system directory sunrpc May 8 00:53:19.347402 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.349118 kernel: Failed to create system directory sunrpc May 8 00:53:19.349152 kernel: Failed to create system directory sunrpc May 8 00:53:19.349167 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.350311 kernel: Failed to create system directory sunrpc May 8 00:53:19.350341 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.351500 kernel: Failed to create system directory sunrpc May 8 00:53:19.351524 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.353271 kernel: Failed to create system directory sunrpc May 8 00:53:19.353305 kernel: Failed to create system directory sunrpc May 8 00:53:19.353323 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.354460 kernel: Failed to create system directory sunrpc May 8 00:53:19.354496 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.356243 kernel: Failed to create system directory sunrpc May 8 00:53:19.356273 kernel: Failed to create system directory sunrpc May 8 00:53:19.356295 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.357460 kernel: Failed to create system directory sunrpc May 8 00:53:19.357495 kernel: Failed to create system directory sunrpc May 8 00:53:19.276000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.366180 kernel: RPC: Registered named UNIX socket transport module. May 8 00:53:19.366257 kernel: RPC: Registered udp transport module. May 8 00:53:19.366273 kernel: RPC: Registered tcp transport module. May 8 00:53:19.366286 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 8 00:53:19.276000 audit[3015]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacdce6560 a1=14a6e4 a2=aaaac6f6e028 a3=aaaacda78010 items=6 ppid=82 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.276000 audit: CWD cwd="/" May 8 00:53:19.276000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PATH item=1 name=(null) inode=20689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PATH item=2 name=(null) inode=20689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PATH item=3 name=(null) inode=20690 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PATH item=4 name=(null) inode=20689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PATH item=5 name=(null) inode=20691 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:19.276000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.394954 kernel: Failed to create system directory nfs May 8 00:53:19.394993 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.396001 kernel: Failed to create system directory nfs May 8 00:53:19.396041 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.397119 kernel: Failed to create system directory nfs May 8 00:53:19.397148 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.398256 kernel: Failed to create system directory nfs May 8 00:53:19.398288 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.399402 kernel: Failed to create system directory nfs May 8 00:53:19.399424 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.400985 kernel: Failed to create system directory nfs May 8 00:53:19.401025 kernel: Failed to create system directory nfs May 8 00:53:19.401044 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.402115 kernel: Failed to create system directory nfs May 8 00:53:19.402153 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.403225 kernel: Failed to create system directory nfs May 8 00:53:19.403252 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.404382 kernel: Failed to create system directory nfs May 8 00:53:19.404414 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.406184 kernel: Failed to create system directory nfs May 8 00:53:19.406229 kernel: Failed to create system directory nfs May 8 00:53:19.406249 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.407168 kernel: Failed to create system directory nfs May 8 00:53:19.407201 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.408302 kernel: Failed to create system directory nfs May 8 00:53:19.408339 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.409459 kernel: Failed to create system directory nfs May 8 00:53:19.409483 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.411128 kernel: Failed to create system directory nfs May 8 00:53:19.411154 kernel: Failed to create system directory nfs May 8 00:53:19.411168 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.412174 kernel: Failed to create system directory nfs May 8 00:53:19.412202 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.413237 kernel: Failed to create system directory nfs May 8 00:53:19.413268 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.414296 kernel: Failed to create system directory nfs May 8 00:53:19.414330 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.415363 kernel: Failed to create system directory nfs May 8 00:53:19.415392 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.416429 kernel: Failed to create system directory nfs May 8 00:53:19.416518 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.418000 kernel: Failed to create system directory nfs May 8 00:53:19.418031 kernel: Failed to create system directory nfs May 8 00:53:19.418046 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.419125 kernel: Failed to create system directory nfs May 8 00:53:19.419153 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.420197 kernel: Failed to create system directory nfs May 8 00:53:19.420233 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.421263 kernel: Failed to create system directory nfs May 8 00:53:19.421299 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.422320 kernel: Failed to create system directory nfs May 8 00:53:19.422346 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.423400 kernel: Failed to create system directory nfs May 8 00:53:19.423427 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.424983 kernel: Failed to create system directory nfs May 8 00:53:19.425018 kernel: Failed to create system directory nfs May 8 00:53:19.425039 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.426034 kernel: Failed to create system directory nfs May 8 00:53:19.426064 kernel: Failed to create system directory nfs May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.389000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.427073 kernel: Failed to create system directory nfs May 8 00:53:19.443959 kernel: FS-Cache: Netfs 'nfs' registered for caching May 8 00:53:19.389000 audit[3015]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacde8f980 a1=116284 a2=aaaac6f6e028 a3=aaaacda78010 items=0 ppid=82 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.389000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.472247 kernel: Failed to create system directory nfs4 May 8 00:53:19.472330 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.473029 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.474442 kernel: Failed to create system directory nfs4 May 8 00:53:19.474497 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.475263 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.476782 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.478679 kernel: Failed to create system directory nfs4 May 8 00:53:19.478731 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.481096 kernel: Failed to create system directory nfs4 May 8 00:53:19.481184 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.482472 kernel: Failed to create system directory nfs4 May 8 00:53:19.482524 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.484421 kernel: Failed to create system directory nfs4 May 8 00:53:19.484460 kernel: Failed to create system directory nfs4 May 8 00:53:19.484492 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.486082 kernel: Failed to create system directory nfs4 May 8 00:53:19.486110 kernel: Failed to create system directory nfs4 May 8 00:53:19.486129 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.487178 kernel: Failed to create system directory nfs4 May 8 00:53:19.487206 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.488245 kernel: Failed to create system directory nfs4 May 8 00:53:19.488272 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.489340 kernel: Failed to create system directory nfs4 May 8 00:53:19.489370 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.490440 kernel: Failed to create system directory nfs4 May 8 00:53:19.490467 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.492077 kernel: Failed to create system directory nfs4 May 8 00:53:19.492112 kernel: Failed to create system directory nfs4 May 8 00:53:19.492131 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.493157 kernel: Failed to create system directory nfs4 May 8 00:53:19.493187 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.494223 kernel: Failed to create system directory nfs4 May 8 00:53:19.494265 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.495311 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.496418 kernel: Failed to create system directory nfs4 May 8 00:53:19.496444 kernel: Failed to create system directory nfs4 May 8 00:53:19.496459 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.498077 kernel: Failed to create system directory nfs4 May 8 00:53:19.498111 kernel: Failed to create system directory nfs4 May 8 00:53:19.498130 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.499179 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.500279 kernel: Failed to create system directory nfs4 May 8 00:53:19.500302 kernel: Failed to create system directory nfs4 May 8 00:53:19.500318 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.501396 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.501940 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.503025 kernel: Failed to create system directory nfs4 May 8 00:53:19.503044 kernel: Failed to create system directory nfs4 May 8 00:53:19.503058 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.504151 kernel: Failed to create system directory nfs4 May 8 00:53:19.504186 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.505241 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.506332 kernel: Failed to create system directory nfs4 May 8 00:53:19.506362 kernel: Failed to create system directory nfs4 May 8 00:53:19.506379 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.507438 kernel: Failed to create system directory nfs4 May 8 00:53:19.507471 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.509144 kernel: Failed to create system directory nfs4 May 8 00:53:19.509171 kernel: Failed to create system directory nfs4 May 8 00:53:19.509185 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.510265 kernel: Failed to create system directory nfs4 May 8 00:53:19.510290 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.511349 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.512438 kernel: Failed to create system directory nfs4 May 8 00:53:19.512473 kernel: Failed to create system directory nfs4 May 8 00:53:19.512492 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.514060 kernel: Failed to create system directory nfs4 May 8 00:53:19.514101 kernel: Failed to create system directory nfs4 May 8 00:53:19.514124 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.515140 kernel: Failed to create system directory nfs4 May 8 00:53:19.515169 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.516228 kernel: Failed to create system directory nfs4 May 8 00:53:19.516253 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.517316 kernel: Failed to create system directory nfs4 May 8 00:53:19.517357 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.518414 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.518968 kernel: Failed to create system directory nfs4 May 8 00:53:19.518996 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.520049 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.521150 kernel: Failed to create system directory nfs4 May 8 00:53:19.521188 kernel: Failed to create system directory nfs4 May 8 00:53:19.521208 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.522251 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.523373 kernel: Failed to create system directory nfs4 May 8 00:53:19.523401 kernel: Failed to create system directory nfs4 May 8 00:53:19.523416 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.525013 kernel: Failed to create system directory nfs4 May 8 00:53:19.525046 kernel: Failed to create system directory nfs4 May 8 00:53:19.525061 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.526117 kernel: Failed to create system directory nfs4 May 8 00:53:19.526146 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.527220 kernel: Failed to create system directory nfs4 May 8 00:53:19.527252 kernel: Failed to create system directory nfs4 May 8 00:53:19.463000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.637959 kernel: NFS: Registering the id_resolver key type May 8 00:53:19.638054 kernel: Key type id_resolver registered May 8 00:53:19.638073 kernel: Key type id_legacy registered May 8 00:53:19.463000 audit[3020]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffaf90a010 a1=19c664 a2=aaaac856e028 a3=aaab00f8f010 items=0 ppid=82 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.463000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.649419 kernel: Failed to create system directory rpcgss May 8 00:53:19.649455 kernel: Failed to create system directory rpcgss May 8 00:53:19.649469 kernel: Failed to create system directory rpcgss May 8 00:53:19.649482 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.651088 kernel: Failed to create system directory rpcgss May 8 00:53:19.651108 kernel: Failed to create system directory rpcgss May 8 00:53:19.651122 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.652207 kernel: Failed to create system directory rpcgss May 8 00:53:19.652230 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.653315 kernel: Failed to create system directory rpcgss May 8 00:53:19.653335 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.654423 kernel: Failed to create system directory rpcgss May 8 00:53:19.654446 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.656097 kernel: Failed to create system directory rpcgss May 8 00:53:19.656121 kernel: Failed to create system directory rpcgss May 8 00:53:19.656141 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.657211 kernel: Failed to create system directory rpcgss May 8 00:53:19.657230 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.658324 kernel: Failed to create system directory rpcgss May 8 00:53:19.658341 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.659457 kernel: Failed to create system directory rpcgss May 8 00:53:19.659492 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.661111 kernel: Failed to create system directory rpcgss May 8 00:53:19.661140 kernel: Failed to create system directory rpcgss May 8 00:53:19.661155 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.644000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:19.662212 kernel: Failed to create system directory rpcgss May 8 00:53:19.644000 audit[3021]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8e9b2010 a1=5ee5c a2=aaaac686e028 a3=aaaad2b9c010 items=0 ppid=82 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.644000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 8 00:53:19.674374 nfsidmap[3030]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 8 00:53:19.677133 nfsidmap[3033]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 8 00:53:19.698000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.698000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1a59f640 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.698000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:53:19.698000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.698000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1a59f640 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.698000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:53:19.698000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.698000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1a59f640 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.698000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:53:19.698000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.698000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.698000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:53:19.847111 env[1219]: time="2025-05-08T00:53:19.846995372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d9f117f3-9205-4f47-838d-9d77d0312d7c,Namespace:default,Attempt:0,}" May 8 00:53:19.963318 systemd-networkd[1052]: cali5ec59c6bf6e: Link UP May 8 00:53:19.965481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:53:19.965564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 8 00:53:19.965460 systemd-networkd[1052]: cali5ec59c6bf6e: Gained carrier May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.896 [INFO][3036] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.132-k8s-test--pod--1-eth0 default d9f117f3-9205-4f47-838d-9d77d0312d7c 1192 0 2025-05-08 00:53:04 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.132 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.896 [INFO][3036] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.923 [INFO][3052] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" HandleID="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Workload="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.934 [INFO][3052] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" HandleID="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Workload="10.0.0.132-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f3480), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.132", "pod":"test-pod-1", "timestamp":"2025-05-08 00:53:19.923403092 +0000 UTC"}, Hostname:"10.0.0.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.934 [INFO][3052] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.934 [INFO][3052] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.934 [INFO][3052] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.132' May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.936 [INFO][3052] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.940 [INFO][3052] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.944 [INFO][3052] ipam/ipam.go 489: Trying affinity for 192.168.100.0/26 host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.946 [INFO][3052] ipam/ipam.go 155: Attempting to load block cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.948 [INFO][3052] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.0/26 host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.948 [INFO][3052] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.0/26 handle="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.950 [INFO][3052] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.953 [INFO][3052] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.100.0/26 handle="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.959 [INFO][3052] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.100.4/26] block=192.168.100.0/26 handle="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.959 [INFO][3052] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.4/26] handle="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" host="10.0.0.132" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.959 [INFO][3052] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.959 [INFO][3052] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.100.4/26] IPv6=[] ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" HandleID="k8s-pod-network.172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Workload="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974035 env[1219]: 2025-05-08 00:53:19.961 [INFO][3036] cni-plugin/k8s.go 386: Populated endpoint ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d9f117f3-9205-4f47-838d-9d77d0312d7c", ResourceVersion:"1192", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:19.974735 env[1219]: 2025-05-08 00:53:19.961 [INFO][3036] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.100.4/32] ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974735 env[1219]: 2025-05-08 00:53:19.961 [INFO][3036] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974735 env[1219]: 2025-05-08 00:53:19.965 [INFO][3036] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.974735 env[1219]: 2025-05-08 00:53:19.965 [INFO][3036] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.132-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d9f117f3-9205-4f47-838d-9d77d0312d7c", ResourceVersion:"1192", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.132", ContainerID:"172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"8a:2d:6b:6a:4a:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:19.974735 env[1219]: 2025-05-08 00:53:19.972 [INFO][3036] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.132-k8s-test--pod--1-eth0" May 8 00:53:19.982000 audit[3073]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:19.982000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffe100a8f0 a2=0 a3=ffffb80edfa8 items=0 ppid=2166 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:19.982000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:19.991508 env[1219]: time="2025-05-08T00:53:19.991439112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:19.991508 env[1219]: time="2025-05-08T00:53:19.991476958Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:19.991508 env[1219]: time="2025-05-08T00:53:19.991487400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:19.992005 env[1219]: time="2025-05-08T00:53:19.991967519Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d pid=3081 runtime=io.containerd.runc.v2 May 8 00:53:20.001843 systemd[1]: Started cri-containerd-172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d.scope. May 8 00:53:20.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.031000 audit: BPF prog-id=126 op=LOAD May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3081 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326437386335303764613265343666363435643139663361383137 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3081 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326437386335303764613265343666363435643139663361383137 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit: BPF prog-id=127 op=LOAD May 8 00:53:20.032000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3081 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326437386335303764613265343666363435643139663361383137 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit: BPF prog-id=128 op=LOAD May 8 00:53:20.032000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3081 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326437386335303764613265343666363435643139663361383137 May 8 00:53:20.032000 audit: BPF prog-id=128 op=UNLOAD May 8 00:53:20.032000 audit: BPF prog-id=127 op=UNLOAD May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.032000 audit: BPF prog-id=129 op=LOAD May 8 00:53:20.032000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3081 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326437386335303764613265343666363435643139663361383137 May 8 00:53:20.034182 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:20.051814 env[1219]: time="2025-05-08T00:53:20.051758585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d9f117f3-9205-4f47-838d-9d77d0312d7c,Namespace:default,Attempt:0,} returns sandbox id \"172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d\"" May 8 00:53:20.053709 env[1219]: time="2025-05-08T00:53:20.053674090Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 8 00:53:20.123503 kubelet[1463]: E0508 00:53:20.123372 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:20.343054 env[1219]: time="2025-05-08T00:53:20.343002536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:20.346692 env[1219]: time="2025-05-08T00:53:20.346660076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:20.348385 env[1219]: time="2025-05-08T00:53:20.348354625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:20.350109 env[1219]: time="2025-05-08T00:53:20.350082060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:20.351611 env[1219]: time="2025-05-08T00:53:20.351570176Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 8 00:53:20.353577 env[1219]: time="2025-05-08T00:53:20.353529527Z" level=info msg="CreateContainer within sandbox \"172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 8 00:53:20.365742 env[1219]: time="2025-05-08T00:53:20.365700659Z" level=info msg="CreateContainer within sandbox \"172d78c507da2e46f645d19f3a817b3ebd89660faca8f24e75a5bf9c63162b3d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b6ec740a13f119575464292d589d84741e50301e0949a63699bd5d2d6b47639a\"" May 8 00:53:20.366158 env[1219]: time="2025-05-08T00:53:20.366088120Z" level=info msg="StartContainer for \"b6ec740a13f119575464292d589d84741e50301e0949a63699bd5d2d6b47639a\"" May 8 00:53:20.383168 systemd[1]: Started cri-containerd-b6ec740a13f119575464292d589d84741e50301e0949a63699bd5d2d6b47639a.scope. May 8 00:53:20.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit: BPF prog-id=130 op=LOAD May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3081 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656337343061313366313139353735343634323932643538396438 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3081 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656337343061313366313139353735343634323932643538396438 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit: BPF prog-id=131 op=LOAD May 8 00:53:20.410000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3081 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656337343061313366313139353735343634323932643538396438 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit: BPF prog-id=132 op=LOAD May 8 00:53:20.410000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3081 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656337343061313366313139353735343634323932643538396438 May 8 00:53:20.410000 audit: BPF prog-id=132 op=UNLOAD May 8 00:53:20.410000 audit: BPF prog-id=131 op=UNLOAD May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.410000 audit: BPF prog-id=133 op=LOAD May 8 00:53:20.410000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3081 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656337343061313366313139353735343634323932643538396438 May 8 00:53:20.426798 env[1219]: time="2025-05-08T00:53:20.426757231Z" level=info msg="StartContainer for \"b6ec740a13f119575464292d589d84741e50301e0949a63699bd5d2d6b47639a\" returns successfully" May 8 00:53:21.123743 kubelet[1463]: E0508 00:53:21.123702 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:21.216215 systemd[1]: run-containerd-runc-k8s.io-b6ec740a13f119575464292d589d84741e50301e0949a63699bd5d2d6b47639a-runc.fyAYNx.mount: Deactivated successfully. May 8 00:53:21.386737 kubelet[1463]: I0508 00:53:21.386399 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.087322386 podStartE2EDuration="17.386383818s" podCreationTimestamp="2025-05-08 00:53:04 +0000 UTC" firstStartedPulling="2025-05-08 00:53:20.053080635 +0000 UTC m=+51.378995312" lastFinishedPulling="2025-05-08 00:53:20.352142067 +0000 UTC m=+51.678056744" observedRunningTime="2025-05-08 00:53:21.386322408 +0000 UTC m=+52.712237085" watchObservedRunningTime="2025-05-08 00:53:21.386383818 +0000 UTC m=+52.712298455" May 8 00:53:21.684094 systemd-networkd[1052]: cali5ec59c6bf6e: Gained IPv6LL May 8 00:53:22.124366 kubelet[1463]: E0508 00:53:22.124314 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:23.125284 kubelet[1463]: E0508 00:53:23.125223 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:24.126186 kubelet[1463]: E0508 00:53:24.126133 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:25.126852 kubelet[1463]: E0508 00:53:25.126799 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:26.127053 kubelet[1463]: E0508 00:53:26.126969 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:53:27.127878 kubelet[1463]: E0508 00:53:27.127826 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"