May 10 00:38:32.066867 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:38:32.066910 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:38:32.066928 kernel: BIOS-provided physical RAM map: May 10 00:38:32.066942 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved May 10 00:38:32.066954 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable May 10 00:38:32.066967 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved May 10 00:38:32.066987 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable May 10 00:38:32.067001 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved May 10 00:38:32.067014 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable May 10 00:38:32.067028 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data May 10 00:38:32.067056 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable May 10 00:38:32.067069 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved May 10 00:38:32.067083 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data May 10 00:38:32.067097 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS May 10 00:38:32.067117 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable May 10 00:38:32.067132 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved May 10 00:38:32.067147 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable May 10 00:38:32.067162 kernel: NX (Execute Disable) protection: active May 10 00:38:32.067176 kernel: efi: EFI v2.70 by EDK II May 10 00:38:32.067192 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 May 10 00:38:32.067206 kernel: random: crng init done May 10 00:38:32.067220 kernel: SMBIOS 2.4 present. May 10 00:38:32.067238 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 May 10 00:38:32.067253 kernel: Hypervisor detected: KVM May 10 00:38:32.067278 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:38:32.067311 kernel: kvm-clock: cpu 0, msr 146196001, primary cpu clock May 10 00:38:32.067325 kernel: kvm-clock: using sched offset of 12543273222 cycles May 10 00:38:32.067340 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:38:32.067355 kernel: tsc: Detected 2299.998 MHz processor May 10 00:38:32.067371 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:38:32.067387 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:38:32.067399 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 May 10 00:38:32.067426 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:38:32.067442 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 May 10 00:38:32.067455 kernel: Using GB pages for direct mapping May 10 00:38:32.067468 kernel: Secure boot disabled May 10 00:38:32.067483 kernel: ACPI: Early table checksum verification disabled May 10 00:38:32.067496 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) May 10 00:38:32.067514 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) May 10 00:38:32.067535 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) May 10 00:38:32.067559 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) May 10 00:38:32.067573 kernel: ACPI: FACS 0x00000000BFBF2000 000040 May 10 00:38:32.067589 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) May 10 00:38:32.067603 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) May 10 00:38:32.067617 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) May 10 00:38:32.067633 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) May 10 00:38:32.067653 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) May 10 00:38:32.067668 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) May 10 00:38:32.067684 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] May 10 00:38:32.067699 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] May 10 00:38:32.067714 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] May 10 00:38:32.067729 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] May 10 00:38:32.067746 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] May 10 00:38:32.067762 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] May 10 00:38:32.067778 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] May 10 00:38:32.067799 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] May 10 00:38:32.067815 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] May 10 00:38:32.067831 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:38:32.067848 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:38:32.067864 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:38:32.067881 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] May 10 00:38:32.067897 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] May 10 00:38:32.067913 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] May 10 00:38:32.067930 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] May 10 00:38:32.067950 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] May 10 00:38:32.067967 kernel: Zone ranges: May 10 00:38:32.067984 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:38:32.068001 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 00:38:32.068017 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] May 10 00:38:32.068033 kernel: Movable zone start for each node May 10 00:38:32.072114 kernel: Early memory node ranges May 10 00:38:32.072133 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] May 10 00:38:32.072149 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] May 10 00:38:32.072170 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] May 10 00:38:32.072186 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] May 10 00:38:32.072202 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] May 10 00:38:32.072218 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] May 10 00:38:32.072235 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] May 10 00:38:32.072250 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:38:32.072266 kernel: On node 0, zone DMA: 11 pages in unavailable ranges May 10 00:38:32.072282 kernel: On node 0, zone DMA: 104 pages in unavailable ranges May 10 00:38:32.072299 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges May 10 00:38:32.072319 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges May 10 00:38:32.072337 kernel: On node 0, zone Normal: 32 pages in unavailable ranges May 10 00:38:32.072353 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:38:32.072370 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:38:32.072386 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:38:32.072402 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:38:32.072427 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:38:32.072443 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:38:32.072459 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:38:32.072478 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:38:32.072495 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:38:32.072512 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:38:32.072529 kernel: Booting paravirtualized kernel on KVM May 10 00:38:32.072545 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:38:32.072562 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:38:32.072579 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:38:32.072595 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:38:32.072610 kernel: pcpu-alloc: [0] 0 1 May 10 00:38:32.072630 kernel: kvm-guest: PV spinlocks enabled May 10 00:38:32.072646 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:38:32.072662 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 May 10 00:38:32.072678 kernel: Policy zone: Normal May 10 00:38:32.072696 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:38:32.072714 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:38:32.072730 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 10 00:38:32.072747 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:38:32.072764 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:38:32.072784 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 344872K reserved, 0K cma-reserved) May 10 00:38:32.072800 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:38:32.072816 kernel: Kernel/User page tables isolation: enabled May 10 00:38:32.072832 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:38:32.072848 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:38:32.072864 kernel: rcu: Hierarchical RCU implementation. May 10 00:38:32.072882 kernel: rcu: RCU event tracing is enabled. May 10 00:38:32.072899 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:38:32.072920 kernel: Rude variant of Tasks RCU enabled. May 10 00:38:32.072949 kernel: Tracing variant of Tasks RCU enabled. May 10 00:38:32.072966 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:38:32.072987 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:38:32.073004 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:38:32.073022 kernel: Console: colour dummy device 80x25 May 10 00:38:32.073064 kernel: printk: console [ttyS0] enabled May 10 00:38:32.073082 kernel: ACPI: Core revision 20210730 May 10 00:38:32.073100 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:38:32.073118 kernel: x2apic enabled May 10 00:38:32.073139 kernel: Switched APIC routing to physical x2apic. May 10 00:38:32.073157 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 May 10 00:38:32.073174 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 10 00:38:32.073193 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) May 10 00:38:32.073210 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 May 10 00:38:32.073228 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 May 10 00:38:32.073246 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:38:32.073267 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 10 00:38:32.073284 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 10 00:38:32.073302 kernel: Spectre V2 : Mitigation: IBRS May 10 00:38:32.073319 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:38:32.073336 kernel: RETBleed: Mitigation: IBRS May 10 00:38:32.073353 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:38:32.073371 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl May 10 00:38:32.073388 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:38:32.073412 kernel: MDS: Mitigation: Clear CPU buffers May 10 00:38:32.073433 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:38:32.073452 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:38:32.073470 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:38:32.073487 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:38:32.073505 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:38:32.073523 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:38:32.073541 kernel: Freeing SMP alternatives memory: 32K May 10 00:38:32.073559 kernel: pid_max: default: 32768 minimum: 301 May 10 00:38:32.073576 kernel: LSM: Security Framework initializing May 10 00:38:32.073597 kernel: SELinux: Initializing. May 10 00:38:32.073614 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:38:32.073631 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:38:32.073649 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) May 10 00:38:32.073667 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. May 10 00:38:32.073684 kernel: signal: max sigframe size: 1776 May 10 00:38:32.073702 kernel: rcu: Hierarchical SRCU implementation. May 10 00:38:32.073719 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:38:32.073737 kernel: smp: Bringing up secondary CPUs ... May 10 00:38:32.073758 kernel: x86: Booting SMP configuration: May 10 00:38:32.073776 kernel: .... node #0, CPUs: #1 May 10 00:38:32.073793 kernel: kvm-clock: cpu 1, msr 146196041, secondary cpu clock May 10 00:38:32.073811 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:38:32.073830 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:38:32.073848 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:38:32.073865 kernel: smpboot: Max logical packages: 1 May 10 00:38:32.073883 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) May 10 00:38:32.073904 kernel: devtmpfs: initialized May 10 00:38:32.073922 kernel: x86/mm: Memory block size: 128MB May 10 00:38:32.073939 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) May 10 00:38:32.073956 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:38:32.073974 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:38:32.073992 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:38:32.074009 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:38:32.074027 kernel: audit: initializing netlink subsys (disabled) May 10 00:38:32.086091 kernel: audit: type=2000 audit(1746837510.908:1): state=initialized audit_enabled=0 res=1 May 10 00:38:32.086123 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:38:32.086142 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:38:32.086161 kernel: cpuidle: using governor menu May 10 00:38:32.086179 kernel: ACPI: bus type PCI registered May 10 00:38:32.086197 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:38:32.086214 kernel: dca service started, version 1.12.1 May 10 00:38:32.086232 kernel: PCI: Using configuration type 1 for base access May 10 00:38:32.086250 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:38:32.086268 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:38:32.086289 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:38:32.086306 kernel: ACPI: Added _OSI(Module Device) May 10 00:38:32.086322 kernel: ACPI: Added _OSI(Processor Device) May 10 00:38:32.086340 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:38:32.086357 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:38:32.086375 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:38:32.086392 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:38:32.086420 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:38:32.086438 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:38:32.086459 kernel: ACPI: Interpreter enabled May 10 00:38:32.086477 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:38:32.086495 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:38:32.086513 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:38:32.086531 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F May 10 00:38:32.086549 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:38:32.086779 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:38:32.086947 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:38:32.086975 kernel: PCI host bridge to bus 0000:00 May 10 00:38:32.087188 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:38:32.087344 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:38:32.087501 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:38:32.087646 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] May 10 00:38:32.087789 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:38:32.087962 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:38:32.099218 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 May 10 00:38:32.099422 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 00:38:32.099596 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:38:32.099775 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 May 10 00:38:32.099945 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] May 10 00:38:32.100147 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] May 10 00:38:32.100336 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:38:32.100515 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] May 10 00:38:32.100678 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] May 10 00:38:32.100847 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:38:32.101020 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] May 10 00:38:32.101209 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] May 10 00:38:32.101233 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:38:32.101259 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:38:32.101276 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:38:32.101291 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:38:32.101308 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:38:32.101325 kernel: iommu: Default domain type: Translated May 10 00:38:32.101341 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:38:32.101358 kernel: vgaarb: loaded May 10 00:38:32.102368 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:38:32.102389 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:38:32.102421 kernel: PTP clock support registered May 10 00:38:32.102439 kernel: Registered efivars operations May 10 00:38:32.102456 kernel: PCI: Using ACPI for IRQ routing May 10 00:38:32.102474 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:38:32.102491 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] May 10 00:38:32.102508 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] May 10 00:38:32.102523 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] May 10 00:38:32.102538 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] May 10 00:38:32.102554 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] May 10 00:38:32.102575 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:38:32.102592 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:38:32.102609 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:38:32.102626 kernel: pnp: PnP ACPI init May 10 00:38:32.102643 kernel: pnp: PnP ACPI: found 7 devices May 10 00:38:32.102661 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:38:32.102677 kernel: NET: Registered PF_INET protocol family May 10 00:38:32.102695 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:38:32.102713 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 10 00:38:32.102734 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:38:32.102752 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:38:32.102770 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 10 00:38:32.102787 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 10 00:38:32.102805 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:38:32.102823 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:38:32.102840 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:38:32.102857 kernel: NET: Registered PF_XDP protocol family May 10 00:38:32.103062 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:38:32.104172 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:38:32.104334 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:38:32.104494 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] May 10 00:38:32.104666 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:38:32.104691 kernel: PCI: CLS 0 bytes, default 64 May 10 00:38:32.104710 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 00:38:32.104729 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) May 10 00:38:32.104753 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:38:32.104771 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 10 00:38:32.104789 kernel: clocksource: Switched to clocksource tsc May 10 00:38:32.104807 kernel: Initialise system trusted keyrings May 10 00:38:32.104825 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 10 00:38:32.104843 kernel: Key type asymmetric registered May 10 00:38:32.104860 kernel: Asymmetric key parser 'x509' registered May 10 00:38:32.104879 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:38:32.104900 kernel: io scheduler mq-deadline registered May 10 00:38:32.104919 kernel: io scheduler kyber registered May 10 00:38:32.104936 kernel: io scheduler bfq registered May 10 00:38:32.104954 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:38:32.104972 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 00:38:32.105169 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver May 10 00:38:32.105193 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 May 10 00:38:32.105359 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver May 10 00:38:32.105382 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 00:38:32.105559 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver May 10 00:38:32.105582 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:38:32.105600 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:38:32.105618 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 10 00:38:32.105636 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A May 10 00:38:32.105654 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A May 10 00:38:32.105831 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) May 10 00:38:32.105856 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:38:32.105879 kernel: i8042: Warning: Keylock active May 10 00:38:32.105896 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:38:32.105914 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:38:32.106088 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:38:32.111181 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:38:32.111350 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:38:31 UTC (1746837511) May 10 00:38:32.111515 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:38:32.111538 kernel: intel_pstate: CPU model not supported May 10 00:38:32.111564 kernel: pstore: Registered efi as persistent store backend May 10 00:38:32.111582 kernel: NET: Registered PF_INET6 protocol family May 10 00:38:32.111600 kernel: Segment Routing with IPv6 May 10 00:38:32.111618 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:38:32.111636 kernel: NET: Registered PF_PACKET protocol family May 10 00:38:32.111654 kernel: Key type dns_resolver registered May 10 00:38:32.111671 kernel: IPI shorthand broadcast: enabled May 10 00:38:32.111689 kernel: sched_clock: Marking stable (698268654, 122325222)->(834713758, -14119882) May 10 00:38:32.111708 kernel: registered taskstats version 1 May 10 00:38:32.111729 kernel: Loading compiled-in X.509 certificates May 10 00:38:32.111747 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:38:32.111766 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:38:32.111783 kernel: Key type .fscrypt registered May 10 00:38:32.111801 kernel: Key type fscrypt-provisioning registered May 10 00:38:32.111819 kernel: pstore: Using crash dump compression: deflate May 10 00:38:32.111837 kernel: ima: Allocated hash algorithm: sha1 May 10 00:38:32.111855 kernel: ima: No architecture policies found May 10 00:38:32.111872 kernel: clk: Disabling unused clocks May 10 00:38:32.111893 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:38:32.111910 kernel: Write protecting the kernel read-only data: 28672k May 10 00:38:32.111928 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:38:32.111946 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:38:32.111964 kernel: Run /init as init process May 10 00:38:32.111982 kernel: with arguments: May 10 00:38:32.112000 kernel: /init May 10 00:38:32.112018 kernel: with environment: May 10 00:38:32.113064 kernel: HOME=/ May 10 00:38:32.113101 kernel: TERM=linux May 10 00:38:32.113119 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:38:32.116424 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:38:32.116452 systemd[1]: Detected virtualization kvm. May 10 00:38:32.116471 systemd[1]: Detected architecture x86-64. May 10 00:38:32.116489 systemd[1]: Running in initrd. May 10 00:38:32.116507 systemd[1]: No hostname configured, using default hostname. May 10 00:38:32.116529 systemd[1]: Hostname set to . May 10 00:38:32.116548 systemd[1]: Initializing machine ID from VM UUID. May 10 00:38:32.116566 systemd[1]: Queued start job for default target initrd.target. May 10 00:38:32.116583 systemd[1]: Started systemd-ask-password-console.path. May 10 00:38:32.116601 systemd[1]: Reached target cryptsetup.target. May 10 00:38:32.116619 systemd[1]: Reached target paths.target. May 10 00:38:32.116637 systemd[1]: Reached target slices.target. May 10 00:38:32.116654 systemd[1]: Reached target swap.target. May 10 00:38:32.116671 systemd[1]: Reached target timers.target. May 10 00:38:32.116694 systemd[1]: Listening on iscsid.socket. May 10 00:38:32.116712 systemd[1]: Listening on iscsiuio.socket. May 10 00:38:32.116730 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:38:32.116748 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:38:32.116766 systemd[1]: Listening on systemd-journald.socket. May 10 00:38:32.116783 systemd[1]: Listening on systemd-networkd.socket. May 10 00:38:32.116801 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:38:32.116823 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:38:32.116841 systemd[1]: Reached target sockets.target. May 10 00:38:32.116878 systemd[1]: Starting kmod-static-nodes.service... May 10 00:38:32.116900 systemd[1]: Finished network-cleanup.service. May 10 00:38:32.116918 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:38:32.116936 systemd[1]: Starting systemd-journald.service... May 10 00:38:32.116954 systemd[1]: Starting systemd-modules-load.service... May 10 00:38:32.116976 kernel: audit: type=1334 audit(1746837512.044:2): prog-id=6 op=LOAD May 10 00:38:32.116995 systemd[1]: Starting systemd-resolved.service... May 10 00:38:32.117014 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:38:32.117031 systemd[1]: Finished kmod-static-nodes.service. May 10 00:38:32.118070 kernel: audit: type=1130 audit(1746837512.067:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.118104 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:38:32.118126 kernel: audit: type=1130 audit(1746837512.074:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.118146 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:38:32.118171 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:38:32.118191 kernel: audit: type=1130 audit(1746837512.105:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.118211 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:38:32.118231 kernel: audit: type=1130 audit(1746837512.112:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.118250 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:38:32.118275 systemd-journald[189]: Journal started May 10 00:38:32.118368 systemd-journald[189]: Runtime Journal (/run/log/journal/26a2424a57ffc1ace6e46f39350a24c8) is 8.0M, max 148.8M, 140.8M free. May 10 00:38:32.044000 audit: BPF prog-id=6 op=LOAD May 10 00:38:32.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.067548 systemd-modules-load[190]: Inserted module 'overlay' May 10 00:38:32.128169 systemd[1]: Started systemd-journald.service. May 10 00:38:32.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.136059 kernel: audit: type=1130 audit(1746837512.120:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.152074 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:38:32.157249 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:38:32.166058 kernel: Bridge firewalling registered May 10 00:38:32.166094 kernel: audit: type=1130 audit(1746837512.161:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.160400 systemd-resolved[191]: Positive Trust Anchors: May 10 00:38:32.160413 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:38:32.160470 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:38:32.161202 systemd-modules-load[190]: Inserted module 'br_netfilter' May 10 00:38:32.169989 systemd-resolved[191]: Defaulting to hostname 'linux'. May 10 00:38:32.191155 dracut-cmdline[205]: dracut-dracut-053 May 10 00:38:32.191155 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:38:32.171213 systemd[1]: Starting dracut-cmdline.service... May 10 00:38:32.209060 kernel: SCSI subsystem initialized May 10 00:38:32.210410 systemd[1]: Started systemd-resolved.service. May 10 00:38:32.224165 kernel: audit: type=1130 audit(1746837512.213:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.214344 systemd[1]: Reached target nss-lookup.target. May 10 00:38:32.228506 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:38:32.228539 kernel: device-mapper: uevent: version 1.0.3 May 10 00:38:32.228562 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:38:32.234541 systemd-modules-load[190]: Inserted module 'dm_multipath' May 10 00:38:32.236130 systemd[1]: Finished systemd-modules-load.service. May 10 00:38:32.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.248026 systemd[1]: Starting systemd-sysctl.service... May 10 00:38:32.257160 kernel: audit: type=1130 audit(1746837512.246:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.263557 systemd[1]: Finished systemd-sysctl.service. May 10 00:38:32.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.291076 kernel: Loading iSCSI transport class v2.0-870. May 10 00:38:32.311080 kernel: iscsi: registered transport (tcp) May 10 00:38:32.338084 kernel: iscsi: registered transport (qla4xxx) May 10 00:38:32.338162 kernel: QLogic iSCSI HBA Driver May 10 00:38:32.381918 systemd[1]: Finished dracut-cmdline.service. May 10 00:38:32.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.387753 systemd[1]: Starting dracut-pre-udev.service... May 10 00:38:32.444099 kernel: raid6: avx2x4 gen() 18329 MB/s May 10 00:38:32.461068 kernel: raid6: avx2x4 xor() 8024 MB/s May 10 00:38:32.478080 kernel: raid6: avx2x2 gen() 18372 MB/s May 10 00:38:32.495081 kernel: raid6: avx2x2 xor() 18607 MB/s May 10 00:38:32.512081 kernel: raid6: avx2x1 gen() 14208 MB/s May 10 00:38:32.529078 kernel: raid6: avx2x1 xor() 16165 MB/s May 10 00:38:32.546081 kernel: raid6: sse2x4 gen() 11072 MB/s May 10 00:38:32.563074 kernel: raid6: sse2x4 xor() 6753 MB/s May 10 00:38:32.580079 kernel: raid6: sse2x2 gen() 12074 MB/s May 10 00:38:32.597078 kernel: raid6: sse2x2 xor() 7464 MB/s May 10 00:38:32.614077 kernel: raid6: sse2x1 gen() 10557 MB/s May 10 00:38:32.631482 kernel: raid6: sse2x1 xor() 5226 MB/s May 10 00:38:32.631513 kernel: raid6: using algorithm avx2x2 gen() 18372 MB/s May 10 00:38:32.631535 kernel: raid6: .... xor() 18607 MB/s, rmw enabled May 10 00:38:32.632194 kernel: raid6: using avx2x2 recovery algorithm May 10 00:38:32.647077 kernel: xor: automatically using best checksumming function avx May 10 00:38:32.752085 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:38:32.763575 systemd[1]: Finished dracut-pre-udev.service. May 10 00:38:32.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.763000 audit: BPF prog-id=7 op=LOAD May 10 00:38:32.763000 audit: BPF prog-id=8 op=LOAD May 10 00:38:32.765709 systemd[1]: Starting systemd-udevd.service... May 10 00:38:32.782078 systemd-udevd[387]: Using default interface naming scheme 'v252'. May 10 00:38:32.789057 systemd[1]: Started systemd-udevd.service. May 10 00:38:32.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.794184 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:38:32.815798 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation May 10 00:38:32.855113 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:38:32.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:32.856483 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:38:32.921990 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:38:32.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:33.018069 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:38:33.022069 kernel: scsi host0: Virtio SCSI HBA May 10 00:38:33.032060 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 May 10 00:38:33.077535 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:38:33.077607 kernel: AES CTR mode by8 optimization enabled May 10 00:38:33.126722 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) May 10 00:38:33.139834 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks May 10 00:38:33.140112 kernel: sd 0:0:1:0: [sda] Write Protect is off May 10 00:38:33.140328 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 May 10 00:38:33.140529 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 10 00:38:33.140727 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:38:33.140752 kernel: GPT:17805311 != 25165823 May 10 00:38:33.140775 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:38:33.140797 kernel: GPT:17805311 != 25165823 May 10 00:38:33.140824 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:38:33.140846 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:38:33.140869 kernel: sd 0:0:1:0: [sda] Attached SCSI disk May 10 00:38:33.191067 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:38:33.194810 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (446) May 10 00:38:33.211487 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:38:33.223933 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:38:33.231339 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:38:33.235134 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:38:33.241356 systemd[1]: Starting disk-uuid.service... May 10 00:38:33.253912 disk-uuid[516]: Primary Header is updated. May 10 00:38:33.253912 disk-uuid[516]: Secondary Entries is updated. May 10 00:38:33.253912 disk-uuid[516]: Secondary Header is updated. May 10 00:38:33.267080 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:38:33.288081 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:38:33.297082 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:38:34.294901 disk-uuid[517]: The operation has completed successfully. May 10 00:38:34.298779 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:38:34.361967 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:38:34.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.362124 systemd[1]: Finished disk-uuid.service. May 10 00:38:34.377320 systemd[1]: Starting verity-setup.service... May 10 00:38:34.403134 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:38:34.471404 systemd[1]: Found device dev-mapper-usr.device. May 10 00:38:34.473759 systemd[1]: Mounting sysusr-usr.mount... May 10 00:38:34.485552 systemd[1]: Finished verity-setup.service. May 10 00:38:34.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.572063 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:38:34.573215 systemd[1]: Mounted sysusr-usr.mount. May 10 00:38:34.573575 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:38:34.627740 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:38:34.627779 kernel: BTRFS info (device sda6): using free space tree May 10 00:38:34.627802 kernel: BTRFS info (device sda6): has skinny extents May 10 00:38:34.627824 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:38:34.574468 systemd[1]: Starting ignition-setup.service... May 10 00:38:34.588120 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:38:34.645963 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:38:34.664187 systemd[1]: Finished ignition-setup.service. May 10 00:38:34.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.665894 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:38:34.705599 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:38:34.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.714000 audit: BPF prog-id=9 op=LOAD May 10 00:38:34.715906 systemd[1]: Starting systemd-networkd.service... May 10 00:38:34.748391 systemd-networkd[692]: lo: Link UP May 10 00:38:34.748408 systemd-networkd[692]: lo: Gained carrier May 10 00:38:34.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.749355 systemd-networkd[692]: Enumeration completed May 10 00:38:34.749478 systemd[1]: Started systemd-networkd.service. May 10 00:38:34.749851 systemd-networkd[692]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:38:34.752535 systemd-networkd[692]: eth0: Link UP May 10 00:38:34.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.752542 systemd-networkd[692]: eth0: Gained carrier May 10 00:38:34.831137 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:38:34.831137 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:38:34.831137 iscsid[702]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:38:34.831137 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:38:34.831137 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:38:34.831137 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:38:34.831137 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:38:34.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.756472 systemd[1]: Reached target network.target. May 10 00:38:34.917540 ignition[656]: Ignition 2.14.0 May 10 00:38:34.764139 systemd-networkd[692]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250509-2100-eba2b36055ef93f5bec3.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250509-2100-eba2b36055ef93f5bec3' May 10 00:38:34.917554 ignition[656]: Stage: fetch-offline May 10 00:38:34.764154 systemd-networkd[692]: eth0: DHCPv4 address 10.128.0.76/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 10 00:38:35.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.917640 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:35.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.779283 systemd[1]: Starting iscsiuio.service... May 10 00:38:34.917695 ignition[656]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:34.799308 systemd[1]: Started iscsiuio.service. May 10 00:38:34.939467 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:34.818450 systemd[1]: Starting iscsid.service... May 10 00:38:35.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.939664 ignition[656]: parsed url from cmdline: "" May 10 00:38:34.896358 systemd[1]: Started iscsid.service. May 10 00:38:34.939669 ignition[656]: no config URL provided May 10 00:38:34.905824 systemd[1]: Starting dracut-initqueue.service... May 10 00:38:34.939676 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:38:35.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.924413 systemd[1]: Finished dracut-initqueue.service. May 10 00:38:34.939687 ignition[656]: no config at "/usr/lib/ignition/user.ign" May 10 00:38:34.936489 systemd[1]: Reached target remote-fs-pre.target. May 10 00:38:34.939696 ignition[656]: failed to fetch config: resource requires networking May 10 00:38:35.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:34.963170 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:38:34.940124 ignition[656]: Ignition finished successfully May 10 00:38:34.977141 systemd[1]: Reached target remote-fs.target. May 10 00:38:35.066616 ignition[716]: Ignition 2.14.0 May 10 00:38:34.990127 systemd[1]: Starting dracut-pre-mount.service... May 10 00:38:35.066624 ignition[716]: Stage: fetch May 10 00:38:35.019580 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:38:35.066748 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:35.026516 systemd[1]: Finished dracut-pre-mount.service. May 10 00:38:35.066777 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:35.055370 systemd[1]: Starting ignition-fetch.service... May 10 00:38:35.074581 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:35.083912 unknown[716]: fetched base config from "system" May 10 00:38:35.074759 ignition[716]: parsed url from cmdline: "" May 10 00:38:35.083921 unknown[716]: fetched base config from "system" May 10 00:38:35.074764 ignition[716]: no config URL provided May 10 00:38:35.083927 unknown[716]: fetched user config from "gcp" May 10 00:38:35.074771 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:38:35.085860 systemd[1]: Finished ignition-fetch.service. May 10 00:38:35.074783 ignition[716]: no config at "/usr/lib/ignition/user.ign" May 10 00:38:35.106308 systemd[1]: Starting ignition-kargs.service... May 10 00:38:35.074818 ignition[716]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 May 10 00:38:35.133468 systemd[1]: Finished ignition-kargs.service. May 10 00:38:35.080655 ignition[716]: GET result: OK May 10 00:38:35.150336 systemd[1]: Starting ignition-disks.service... May 10 00:38:35.080726 ignition[716]: parsing config with SHA512: 48bfc93a730e47abe05cace888e416dda497d40e8338abd9174ae73023f7618e63215ba3904dcd51fb2c191901e7968ec26b2b2b6e225a0d6ff6d6a8a2cb7ab3 May 10 00:38:35.174526 systemd[1]: Finished ignition-disks.service. May 10 00:38:35.084414 ignition[716]: fetch: fetch complete May 10 00:38:35.194483 systemd[1]: Reached target initrd-root-device.target. May 10 00:38:35.084426 ignition[716]: fetch: fetch passed May 10 00:38:35.212252 systemd[1]: Reached target local-fs-pre.target. May 10 00:38:35.084471 ignition[716]: Ignition finished successfully May 10 00:38:35.220341 systemd[1]: Reached target local-fs.target. May 10 00:38:35.118984 ignition[722]: Ignition 2.14.0 May 10 00:38:35.234319 systemd[1]: Reached target sysinit.target. May 10 00:38:35.118993 ignition[722]: Stage: kargs May 10 00:38:35.246315 systemd[1]: Reached target basic.target. May 10 00:38:35.119168 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:35.258410 systemd[1]: Starting systemd-fsck-root.service... May 10 00:38:35.119212 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:35.126247 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:35.127308 ignition[722]: kargs: kargs passed May 10 00:38:35.127350 ignition[722]: Ignition finished successfully May 10 00:38:35.161097 ignition[728]: Ignition 2.14.0 May 10 00:38:35.161108 ignition[728]: Stage: disks May 10 00:38:35.161242 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:35.161274 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:35.168295 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:35.169401 ignition[728]: disks: disks passed May 10 00:38:35.169453 ignition[728]: Ignition finished successfully May 10 00:38:35.295444 systemd-fsck[736]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 00:38:35.512973 systemd[1]: Finished systemd-fsck-root.service. May 10 00:38:35.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:35.522206 systemd[1]: Mounting sysroot.mount... May 10 00:38:35.551208 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:38:35.548615 systemd[1]: Mounted sysroot.mount. May 10 00:38:35.558404 systemd[1]: Reached target initrd-root-fs.target. May 10 00:38:35.575009 systemd[1]: Mounting sysroot-usr.mount... May 10 00:38:35.581788 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:38:35.581833 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:38:35.581861 systemd[1]: Reached target ignition-diskful.target. May 10 00:38:35.667941 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (742) May 10 00:38:35.667979 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:38:35.668002 kernel: BTRFS info (device sda6): using free space tree May 10 00:38:35.668024 kernel: BTRFS info (device sda6): has skinny extents May 10 00:38:35.593433 systemd[1]: Mounted sysroot-usr.mount. May 10 00:38:35.626503 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:38:35.691214 initrd-setup-root[747]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:38:35.701148 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:38:35.641377 systemd[1]: Starting initrd-setup-root.service... May 10 00:38:35.709207 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 10 00:38:35.726151 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:38:35.718644 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:38:35.751198 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:38:35.768625 systemd[1]: Finished initrd-setup-root.service. May 10 00:38:35.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:35.769951 systemd[1]: Starting ignition-mount.service... May 10 00:38:35.797155 systemd[1]: Starting sysroot-boot.service... May 10 00:38:35.812593 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:38:35.812755 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:38:35.819535 systemd-networkd[692]: eth0: Gained IPv6LL May 10 00:38:35.840182 ignition[808]: INFO : Ignition 2.14.0 May 10 00:38:35.840182 ignition[808]: INFO : Stage: mount May 10 00:38:35.840182 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:35.840182 ignition[808]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:35.944186 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (818) May 10 00:38:35.944228 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:38:35.944262 kernel: BTRFS info (device sda6): using free space tree May 10 00:38:35.944285 kernel: BTRFS info (device sda6): has skinny extents May 10 00:38:35.944308 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:38:35.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:35.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:35.837778 systemd[1]: Finished sysroot-boot.service. May 10 00:38:35.960233 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:35.960233 ignition[808]: INFO : mount: mount passed May 10 00:38:35.960233 ignition[808]: INFO : Ignition finished successfully May 10 00:38:35.849461 systemd[1]: Finished ignition-mount.service. May 10 00:38:35.857359 systemd[1]: Starting ignition-files.service... May 10 00:38:35.878785 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:38:36.010195 ignition[837]: INFO : Ignition 2.14.0 May 10 00:38:36.010195 ignition[837]: INFO : Stage: files May 10 00:38:36.010195 ignition[837]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:36.010195 ignition[837]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:36.010195 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:36.010195 ignition[837]: DEBUG : files: compiled without relabeling support, skipping May 10 00:38:36.010195 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:38:36.010195 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:38:36.010195 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:38:36.010195 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:38:36.010195 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2309457105" May 10 00:38:36.010195 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2309457105": device or resource busy May 10 00:38:36.010195 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2309457105", trying btrfs: device or resource busy May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2309457105" May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2309457105" May 10 00:38:36.010195 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2309457105" May 10 00:38:35.938836 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2309457105" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2771412059" May 10 00:38:36.277148 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2771412059": device or resource busy May 10 00:38:36.277148 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2771412059", trying btrfs: device or resource busy May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2771412059" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2771412059" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem2771412059" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem2771412059" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:38:36.277148 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:38:35.989871 unknown[837]: wrote ssh authorized keys file for user: core May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469344548" May 10 00:38:36.527198 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469344548": device or resource busy May 10 00:38:36.527198 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2469344548", trying btrfs: device or resource busy May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469344548" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469344548" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2469344548" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2469344548" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 10 00:38:36.527198 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3626168550" May 10 00:38:36.773211 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3626168550": device or resource busy May 10 00:38:36.773211 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3626168550", trying btrfs: device or resource busy May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3626168550" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3626168550" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3626168550" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3626168550" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 00:38:36.773211 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK May 10 00:38:37.165150 kernel: kauditd_printk_skb: 27 callbacks suppressed May 10 00:38:37.165201 kernel: audit: type=1130 audit(1746837516.807:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.165239 kernel: audit: type=1130 audit(1746837516.934:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.165265 kernel: audit: type=1130 audit(1746837516.971:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.165281 kernel: audit: type=1131 audit(1746837516.971:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.165295 kernel: audit: type=1130 audit(1746837517.081:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.165310 kernel: audit: type=1131 audit(1746837517.081:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.797309 systemd[1]: Finished ignition-files.service. May 10 00:38:37.179215 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:38:37.179215 ignition[837]: INFO : files: op(17): [started] processing unit "oem-gce.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(17): [finished] processing unit "oem-gce.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(18): [started] processing unit "oem-gce-enable-oslogin.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(18): [finished] processing unit "oem-gce-enable-oslogin.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(19): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(19): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" May 10 00:38:37.179215 ignition[837]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:38:37.179215 ignition[837]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:38:37.179215 ignition[837]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:38:37.179215 ignition[837]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:38:37.179215 ignition[837]: INFO : files: files passed May 10 00:38:37.179215 ignition[837]: INFO : Ignition finished successfully May 10 00:38:37.520158 kernel: audit: type=1130 audit(1746837517.214:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.520220 kernel: audit: type=1131 audit(1746837517.323:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.818787 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:38:36.884185 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:38:37.563188 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:38:36.885242 systemd[1]: Starting ignition-quench.service... May 10 00:38:37.619174 kernel: audit: type=1131 audit(1746837517.591:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.908476 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:38:36.935521 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:38:37.671153 kernel: audit: type=1131 audit(1746837517.642:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.935659 systemd[1]: Finished ignition-quench.service. May 10 00:38:37.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:36.972527 systemd[1]: Reached target ignition-complete.target. May 10 00:38:37.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.034298 systemd[1]: Starting initrd-parse-etc.service... May 10 00:38:37.076937 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:38:37.721150 ignition[875]: INFO : Ignition 2.14.0 May 10 00:38:37.721150 ignition[875]: INFO : Stage: umount May 10 00:38:37.721150 ignition[875]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:38:37.721150 ignition[875]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:38:37.721150 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:38:37.721150 ignition[875]: INFO : umount: umount passed May 10 00:38:37.721150 ignition[875]: INFO : Ignition finished successfully May 10 00:38:37.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.077071 systemd[1]: Finished initrd-parse-etc.service. May 10 00:38:37.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.082473 systemd[1]: Reached target initrd-fs.target. May 10 00:38:37.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.148341 systemd[1]: Reached target initrd.target. May 10 00:38:37.172316 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:38:37.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.173405 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:38:37.198548 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:38:37.216547 systemd[1]: Starting initrd-cleanup.service... May 10 00:38:37.261159 systemd[1]: Stopped target nss-lookup.target. May 10 00:38:37.269437 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:38:37.287438 systemd[1]: Stopped target timers.target. May 10 00:38:37.306418 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:38:37.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.306584 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:38:37.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.324635 systemd[1]: Stopped target initrd.target. May 10 00:38:37.362431 systemd[1]: Stopped target basic.target. May 10 00:38:37.380434 systemd[1]: Stopped target ignition-complete.target. May 10 00:38:37.399417 systemd[1]: Stopped target ignition-diskful.target. May 10 00:38:38.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.418412 systemd[1]: Stopped target initrd-root-device.target. May 10 00:38:38.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.437421 systemd[1]: Stopped target remote-fs.target. May 10 00:38:38.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:38.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:38.080000 audit: BPF prog-id=6 op=UNLOAD May 10 00:38:37.458457 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:38:37.479505 systemd[1]: Stopped target sysinit.target. May 10 00:38:37.512427 systemd[1]: Stopped target local-fs.target. May 10 00:38:38.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.528400 systemd[1]: Stopped target local-fs-pre.target. May 10 00:38:38.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.546406 systemd[1]: Stopped target swap.target. May 10 00:38:38.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.570353 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:38:37.570529 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:38:38.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.592661 systemd[1]: Stopped target cryptsetup.target. May 10 00:38:37.627408 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:38:37.627596 systemd[1]: Stopped dracut-initqueue.service. May 10 00:38:38.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.643530 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:38:38.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.643718 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:38:38.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.681436 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:38:37.681592 systemd[1]: Stopped ignition-files.service. May 10 00:38:38.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.697545 systemd[1]: Stopping ignition-mount.service... May 10 00:38:38.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.729285 systemd[1]: Stopping sysroot-boot.service... May 10 00:38:38.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.742270 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:38:38.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.742473 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:38:38.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:38.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:37.749510 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:38:37.749669 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:38:37.771031 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:38:37.772251 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:38:37.772354 systemd[1]: Stopped ignition-mount.service. May 10 00:38:38.428203 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). May 10 00:38:37.792760 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:38:38.437155 iscsid[702]: iscsid shutting down. May 10 00:38:37.792857 systemd[1]: Stopped sysroot-boot.service. May 10 00:38:37.809835 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:38:37.809983 systemd[1]: Stopped ignition-disks.service. May 10 00:38:37.821371 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:38:37.821423 systemd[1]: Stopped ignition-kargs.service. May 10 00:38:37.843285 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:38:37.843333 systemd[1]: Stopped ignition-fetch.service. May 10 00:38:37.858288 systemd[1]: Stopped target network.target. May 10 00:38:37.873127 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:38:37.873293 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:38:37.880349 systemd[1]: Stopped target paths.target. May 10 00:38:37.905120 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:38:37.910109 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:38:37.913273 systemd[1]: Stopped target slices.target. May 10 00:38:37.927280 systemd[1]: Stopped target sockets.target. May 10 00:38:37.939312 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:38:37.939344 systemd[1]: Closed iscsid.socket. May 10 00:38:37.951318 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:38:37.951354 systemd[1]: Closed iscsiuio.socket. May 10 00:38:37.963296 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:38:37.963349 systemd[1]: Stopped ignition-setup.service. May 10 00:38:37.975335 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:38:37.975384 systemd[1]: Stopped initrd-setup-root.service. May 10 00:38:37.998440 systemd[1]: Stopping systemd-networkd.service... May 10 00:38:38.002096 systemd-networkd[692]: eth0: DHCPv6 lease lost May 10 00:38:38.013406 systemd[1]: Stopping systemd-resolved.service... May 10 00:38:38.027789 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:38:38.027902 systemd[1]: Stopped systemd-resolved.service. May 10 00:38:38.049899 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:38:38.050055 systemd[1]: Stopped systemd-networkd.service. May 10 00:38:38.065924 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:38:38.066058 systemd[1]: Finished initrd-cleanup.service. May 10 00:38:38.082300 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:38:38.082339 systemd[1]: Closed systemd-networkd.socket. May 10 00:38:38.097181 systemd[1]: Stopping network-cleanup.service... May 10 00:38:38.111183 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:38:38.111279 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:38:38.125257 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:38:38.125329 systemd[1]: Stopped systemd-sysctl.service. May 10 00:38:38.140371 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:38:38.140426 systemd[1]: Stopped systemd-modules-load.service. May 10 00:38:38.155350 systemd[1]: Stopping systemd-udevd.service... May 10 00:38:38.171658 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:38:38.172320 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:38:38.172461 systemd[1]: Stopped systemd-udevd.service. May 10 00:38:38.187666 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:38:38.187763 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:38:38.201301 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:38:38.201346 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:38:38.216251 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:38:38.216311 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:38:38.224375 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:38:38.224423 systemd[1]: Stopped dracut-cmdline.service. May 10 00:38:38.246290 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:38:38.246338 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:38:38.257276 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:38:38.279127 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:38:38.279230 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:38:38.294358 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:38:38.294404 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:38:38.309208 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:38:38.309278 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:38:38.325499 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:38:38.326208 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:38:38.326311 systemd[1]: Stopped network-cleanup.service. May 10 00:38:38.339463 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:38:38.339566 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:38:38.357391 systemd[1]: Reached target initrd-switch-root.target. May 10 00:38:38.374135 systemd[1]: Starting initrd-switch-root.service... May 10 00:38:38.391650 systemd[1]: Switching root. May 10 00:38:38.440335 systemd-journald[189]: Journal stopped May 10 00:38:43.105894 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:38:43.106005 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:38:43.106054 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:38:43.106086 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:38:43.106108 kernel: SELinux: policy capability open_perms=1 May 10 00:38:43.106137 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:38:43.106159 kernel: SELinux: policy capability always_check_network=0 May 10 00:38:43.106182 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:38:43.106205 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:38:43.106227 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:38:43.106250 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:38:43.106279 systemd[1]: Successfully loaded SELinux policy in 111.669ms. May 10 00:38:43.106322 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.028ms. May 10 00:38:43.106348 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:38:43.106373 systemd[1]: Detected virtualization kvm. May 10 00:38:43.106397 systemd[1]: Detected architecture x86-64. May 10 00:38:43.106421 systemd[1]: Detected first boot. May 10 00:38:43.106446 systemd[1]: Initializing machine ID from VM UUID. May 10 00:38:43.106475 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:38:43.106499 systemd[1]: Populated /etc with preset unit settings. May 10 00:38:43.106525 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:38:43.106560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:38:43.106588 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:38:43.106629 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:38:43.106653 kernel: audit: type=1334 audit(1746837522.170:88): prog-id=12 op=LOAD May 10 00:38:43.106676 kernel: audit: type=1334 audit(1746837522.170:89): prog-id=3 op=UNLOAD May 10 00:38:43.106703 kernel: audit: type=1334 audit(1746837522.175:90): prog-id=13 op=LOAD May 10 00:38:43.106726 kernel: audit: type=1334 audit(1746837522.182:91): prog-id=14 op=LOAD May 10 00:38:43.106750 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:38:43.106774 kernel: audit: type=1334 audit(1746837522.182:92): prog-id=4 op=UNLOAD May 10 00:38:43.106796 kernel: audit: type=1334 audit(1746837522.182:93): prog-id=5 op=UNLOAD May 10 00:38:43.106820 kernel: audit: type=1131 audit(1746837522.185:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.106843 systemd[1]: Stopped iscsiuio.service. May 10 00:38:43.106866 kernel: audit: type=1334 audit(1746837522.250:95): prog-id=12 op=UNLOAD May 10 00:38:43.106898 kernel: audit: type=1131 audit(1746837522.265:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.106921 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:38:43.106946 systemd[1]: Stopped iscsid.service. May 10 00:38:43.106968 kernel: audit: type=1131 audit(1746837522.304:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.106990 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:38:43.107014 systemd[1]: Stopped initrd-switch-root.service. May 10 00:38:43.107053 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:38:43.107082 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:38:43.107106 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:38:43.107130 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:38:43.107155 systemd[1]: Created slice system-getty.slice. May 10 00:38:43.107177 systemd[1]: Created slice system-modprobe.slice. May 10 00:38:43.107201 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:38:43.107225 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:38:43.107247 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:38:43.107269 systemd[1]: Created slice user.slice. May 10 00:38:43.107296 systemd[1]: Started systemd-ask-password-console.path. May 10 00:38:43.107318 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:38:43.107341 systemd[1]: Set up automount boot.automount. May 10 00:38:43.107365 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:38:43.107390 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:38:43.107413 systemd[1]: Stopped target initrd-fs.target. May 10 00:38:43.107436 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:38:43.107459 systemd[1]: Reached target integritysetup.target. May 10 00:38:43.107482 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:38:43.107510 systemd[1]: Reached target remote-fs.target. May 10 00:38:43.107533 systemd[1]: Reached target slices.target. May 10 00:38:43.107556 systemd[1]: Reached target swap.target. May 10 00:38:43.107580 systemd[1]: Reached target torcx.target. May 10 00:38:43.107615 systemd[1]: Reached target veritysetup.target. May 10 00:38:43.107640 systemd[1]: Listening on systemd-coredump.socket. May 10 00:38:43.107668 systemd[1]: Listening on systemd-initctl.socket. May 10 00:38:43.107694 systemd[1]: Listening on systemd-networkd.socket. May 10 00:38:43.107718 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:38:43.107743 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:38:43.107774 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:38:43.107797 systemd[1]: Mounting dev-hugepages.mount... May 10 00:38:43.107821 systemd[1]: Mounting dev-mqueue.mount... May 10 00:38:43.107845 systemd[1]: Mounting media.mount... May 10 00:38:43.107872 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:43.107897 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:38:43.107922 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:38:43.107946 systemd[1]: Mounting tmp.mount... May 10 00:38:43.107972 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:38:43.108010 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:38:43.108036 systemd[1]: Starting kmod-static-nodes.service... May 10 00:38:43.108092 systemd[1]: Starting modprobe@configfs.service... May 10 00:38:43.108122 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:38:43.108147 systemd[1]: Starting modprobe@drm.service... May 10 00:38:43.108169 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:38:43.108190 systemd[1]: Starting modprobe@fuse.service... May 10 00:38:43.108213 systemd[1]: Starting modprobe@loop.service... May 10 00:38:43.108238 kernel: fuse: init (API version 7.34) May 10 00:38:43.108267 kernel: loop: module loaded May 10 00:38:43.108291 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:38:43.108314 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:38:43.108337 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:38:43.108362 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:38:43.108385 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:38:43.108408 systemd[1]: Stopped systemd-journald.service. May 10 00:38:43.108431 systemd[1]: Starting systemd-journald.service... May 10 00:38:43.108455 systemd[1]: Starting systemd-modules-load.service... May 10 00:38:43.108487 systemd-journald[998]: Journal started May 10 00:38:43.109528 systemd-journald[998]: Runtime Journal (/run/log/journal/26a2424a57ffc1ace6e46f39350a24c8) is 8.0M, max 148.8M, 140.8M free. May 10 00:38:43.109625 systemd[1]: Starting systemd-network-generator.service... May 10 00:38:38.439000 audit: BPF prog-id=9 op=UNLOAD May 10 00:38:38.724000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:38:38.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:38:38.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:38:38.870000 audit: BPF prog-id=10 op=LOAD May 10 00:38:38.870000 audit: BPF prog-id=10 op=UNLOAD May 10 00:38:38.870000 audit: BPF prog-id=11 op=LOAD May 10 00:38:38.870000 audit: BPF prog-id=11 op=UNLOAD May 10 00:38:39.020000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:38:39.020000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:39.020000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:38:39.031000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:38:39.031000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:39.031000 audit: CWD cwd="/" May 10 00:38:39.031000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:39.031000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:39.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:38:42.170000 audit: BPF prog-id=12 op=LOAD May 10 00:38:42.170000 audit: BPF prog-id=3 op=UNLOAD May 10 00:38:42.175000 audit: BPF prog-id=13 op=LOAD May 10 00:38:42.182000 audit: BPF prog-id=14 op=LOAD May 10 00:38:42.182000 audit: BPF prog-id=4 op=UNLOAD May 10 00:38:42.182000 audit: BPF prog-id=5 op=UNLOAD May 10 00:38:42.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:42.250000 audit: BPF prog-id=12 op=UNLOAD May 10 00:38:42.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:42.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:42.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:42.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.074000 audit: BPF prog-id=15 op=LOAD May 10 00:38:43.074000 audit: BPF prog-id=16 op=LOAD May 10 00:38:43.074000 audit: BPF prog-id=17 op=LOAD May 10 00:38:43.074000 audit: BPF prog-id=13 op=UNLOAD May 10 00:38:43.074000 audit: BPF prog-id=14 op=UNLOAD May 10 00:38:43.102000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:38:43.102000 audit[998]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff9c5adae0 a2=4000 a3=7fff9c5adb7c items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:43.102000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:38:42.168337 systemd[1]: Queued start job for default target multi-user.target. May 10 00:38:39.016514 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:38:42.168351 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:38:39.017237 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:38:42.185877 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:38:39.017271 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:38:39.017321 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:38:39.017342 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:38:39.017395 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:38:39.017418 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:38:39.017728 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:38:39.017801 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:38:39.017827 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:38:39.019803 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:38:39.020699 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:38:39.020736 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:38:39.020766 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:38:39.020800 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:38:39.020827 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:38:41.581655 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:38:41.581952 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:38:41.582120 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:38:41.582356 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:38:41.582414 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:38:41.582485 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:38:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:38:43.134087 systemd[1]: Starting systemd-remount-fs.service... May 10 00:38:43.148080 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:38:43.161065 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:38:43.167075 systemd[1]: Stopped verity-setup.service. May 10 00:38:43.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.186066 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:43.195080 systemd[1]: Started systemd-journald.service. May 10 00:38:43.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.204438 systemd[1]: Mounted dev-hugepages.mount. May 10 00:38:43.211344 systemd[1]: Mounted dev-mqueue.mount. May 10 00:38:43.218321 systemd[1]: Mounted media.mount. May 10 00:38:43.225304 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:38:43.233293 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:38:43.241245 systemd[1]: Mounted tmp.mount. May 10 00:38:43.248381 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:38:43.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.257440 systemd[1]: Finished kmod-static-nodes.service. May 10 00:38:43.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.266496 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:38:43.266726 systemd[1]: Finished modprobe@configfs.service. May 10 00:38:43.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.275497 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:38:43.275692 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:38:43.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.284504 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:38:43.284721 systemd[1]: Finished modprobe@drm.service. May 10 00:38:43.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.293464 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:38:43.293659 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:38:43.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.302476 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:38:43.302673 systemd[1]: Finished modprobe@fuse.service. May 10 00:38:43.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.311468 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:38:43.311669 systemd[1]: Finished modprobe@loop.service. May 10 00:38:43.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.320542 systemd[1]: Finished systemd-modules-load.service. May 10 00:38:43.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.329482 systemd[1]: Finished systemd-network-generator.service. May 10 00:38:43.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.339476 systemd[1]: Finished systemd-remount-fs.service. May 10 00:38:43.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.348442 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:38:43.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.357833 systemd[1]: Reached target network-pre.target. May 10 00:38:43.367516 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:38:43.377472 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:38:43.384173 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:38:43.386497 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:38:43.395561 systemd[1]: Starting systemd-journal-flush.service... May 10 00:38:43.404737 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:38:43.405779 systemd-journald[998]: Time spent on flushing to /var/log/journal/26a2424a57ffc1ace6e46f39350a24c8 is 74.912ms for 1134 entries. May 10 00:38:43.405779 systemd-journald[998]: System Journal (/var/log/journal/26a2424a57ffc1ace6e46f39350a24c8) is 8.0M, max 584.8M, 576.8M free. May 10 00:38:43.506725 systemd-journald[998]: Received client request to flush runtime journal. May 10 00:38:43.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.406324 systemd[1]: Starting systemd-random-seed.service... May 10 00:38:43.421219 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:38:43.422760 systemd[1]: Starting systemd-sysctl.service... May 10 00:38:43.431740 systemd[1]: Starting systemd-sysusers.service... May 10 00:38:43.440746 systemd[1]: Starting systemd-udev-settle.service... May 10 00:38:43.507977 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:38:43.451585 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:38:43.460378 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:38:43.469478 systemd[1]: Finished systemd-random-seed.service. May 10 00:38:43.478623 systemd[1]: Finished systemd-sysctl.service. May 10 00:38:43.490843 systemd[1]: Reached target first-boot-complete.target. May 10 00:38:43.506057 systemd[1]: Finished systemd-sysusers.service. May 10 00:38:43.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.514754 systemd[1]: Finished systemd-journal-flush.service. May 10 00:38:43.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:43.525733 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:38:43.581750 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:38:43.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.083819 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:38:44.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.092000 audit: BPF prog-id=18 op=LOAD May 10 00:38:44.092000 audit: BPF prog-id=19 op=LOAD May 10 00:38:44.093000 audit: BPF prog-id=7 op=UNLOAD May 10 00:38:44.093000 audit: BPF prog-id=8 op=UNLOAD May 10 00:38:44.095001 systemd[1]: Starting systemd-udevd.service... May 10 00:38:44.117650 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 10 00:38:44.159976 systemd[1]: Started systemd-udevd.service. May 10 00:38:44.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.170000 audit: BPF prog-id=20 op=LOAD May 10 00:38:44.172322 systemd[1]: Starting systemd-networkd.service... May 10 00:38:44.185000 audit: BPF prog-id=21 op=LOAD May 10 00:38:44.185000 audit: BPF prog-id=22 op=LOAD May 10 00:38:44.185000 audit: BPF prog-id=23 op=LOAD May 10 00:38:44.187955 systemd[1]: Starting systemd-userdbd.service... May 10 00:38:44.235692 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:38:44.253571 systemd[1]: Started systemd-userdbd.service. May 10 00:38:44.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.387752 systemd-networkd[1029]: lo: Link UP May 10 00:38:44.387766 systemd-networkd[1029]: lo: Gained carrier May 10 00:38:44.389132 systemd-networkd[1029]: Enumeration completed May 10 00:38:44.389271 systemd[1]: Started systemd-networkd.service. May 10 00:38:44.390845 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:38:44.392837 systemd-networkd[1029]: eth0: Link UP May 10 00:38:44.392960 systemd-networkd[1029]: eth0: Gained carrier May 10 00:38:44.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.403596 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:38:44.404204 systemd-networkd[1029]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250509-2100-eba2b36055ef93f5bec3.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250509-2100-eba2b36055ef93f5bec3' May 10 00:38:44.404228 systemd-networkd[1029]: eth0: DHCPv4 address 10.128.0.76/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 10 00:38:44.434075 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:38:44.440000 audit[1043]: AVC avc: denied { confidentiality } for pid=1043 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:38:44.440000 audit[1043]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608979a80b0 a1=338ac a2=7f0bf474dbc5 a3=5 items=110 ppid=1017 pid=1043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:44.440000 audit: CWD cwd="/" May 10 00:38:44.440000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=1 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=2 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=3 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=4 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=5 name=(null) inode=14319 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=6 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=7 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=8 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=9 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=10 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=11 name=(null) inode=14322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=12 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=13 name=(null) inode=14323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=14 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=15 name=(null) inode=14324 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=16 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=17 name=(null) inode=14325 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=18 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=19 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=20 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=21 name=(null) inode=14327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=22 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=23 name=(null) inode=14328 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=24 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=25 name=(null) inode=14329 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=26 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=27 name=(null) inode=14330 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=28 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=29 name=(null) inode=14331 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=30 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=31 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=32 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=33 name=(null) inode=14333 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=34 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=35 name=(null) inode=14334 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=36 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=37 name=(null) inode=14335 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=38 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=39 name=(null) inode=14336 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=40 name=(null) inode=14332 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=41 name=(null) inode=14337 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=42 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=43 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=44 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=45 name=(null) inode=14339 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=46 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=47 name=(null) inode=14340 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=48 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=49 name=(null) inode=14341 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=50 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=51 name=(null) inode=14342 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=52 name=(null) inode=14338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=53 name=(null) inode=14343 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=55 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=56 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=57 name=(null) inode=14345 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=58 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=59 name=(null) inode=14346 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=60 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=61 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=62 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=63 name=(null) inode=14348 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=64 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=65 name=(null) inode=14349 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=66 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=67 name=(null) inode=14350 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=68 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=69 name=(null) inode=14351 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=70 name=(null) inode=14347 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=71 name=(null) inode=14352 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=72 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=73 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=74 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=75 name=(null) inode=14354 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=76 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=77 name=(null) inode=14355 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=78 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=79 name=(null) inode=14356 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=80 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=81 name=(null) inode=14357 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=82 name=(null) inode=14353 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=83 name=(null) inode=14358 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=84 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=85 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=86 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=87 name=(null) inode=14360 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=88 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=89 name=(null) inode=14361 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=90 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=91 name=(null) inode=14362 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=92 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=93 name=(null) inode=14363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=94 name=(null) inode=14359 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=95 name=(null) inode=14364 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=96 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=97 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=98 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=99 name=(null) inode=14366 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=100 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=101 name=(null) inode=14367 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=102 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=103 name=(null) inode=14368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=104 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=105 name=(null) inode=14369 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=106 name=(null) inode=14365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=107 name=(null) inode=14370 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PATH item=109 name=(null) inode=14371 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:38:44.440000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:38:44.491070 kernel: ACPI: button: Power Button [PWRF] May 10 00:38:44.501259 kernel: EDAC MC: Ver: 3.0.0 May 10 00:38:44.521922 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:38:44.522004 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:38:44.523453 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:38:44.540116 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:38:44.555098 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:38:44.575523 systemd[1]: Finished systemd-udev-settle.service. May 10 00:38:44.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.585622 systemd[1]: Starting lvm2-activation-early.service... May 10 00:38:44.612148 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:38:44.641295 systemd[1]: Finished lvm2-activation-early.service. May 10 00:38:44.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.650322 systemd[1]: Reached target cryptsetup.target. May 10 00:38:44.660563 systemd[1]: Starting lvm2-activation.service... May 10 00:38:44.667353 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:38:44.697303 systemd[1]: Finished lvm2-activation.service. May 10 00:38:44.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.706364 systemd[1]: Reached target local-fs-pre.target. May 10 00:38:44.715158 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:38:44.715205 systemd[1]: Reached target local-fs.target. May 10 00:38:44.723155 systemd[1]: Reached target machines.target. May 10 00:38:44.732810 systemd[1]: Starting ldconfig.service... May 10 00:38:44.741553 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:38:44.741640 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:44.743218 systemd[1]: Starting systemd-boot-update.service... May 10 00:38:44.751653 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:38:44.762773 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:38:44.764953 systemd[1]: Starting systemd-sysext.service... May 10 00:38:44.765850 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) May 10 00:38:44.768758 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:38:44.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.788596 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:38:44.795962 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:38:44.804316 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:38:44.804535 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:38:44.828072 kernel: loop0: detected capacity change from 0 to 205544 May 10 00:38:44.916718 systemd-fsck[1067]: fsck.fat 4.2 (2021-01-31) May 10 00:38:44.916718 systemd-fsck[1067]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:38:44.919643 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:38:44.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:44.932340 systemd[1]: Mounting boot.mount... May 10 00:38:44.954402 systemd[1]: Mounted boot.mount. May 10 00:38:44.974699 systemd[1]: Finished systemd-boot-update.service. May 10 00:38:44.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.147508 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:38:45.148492 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:38:45.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.176129 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:38:45.215093 kernel: loop1: detected capacity change from 0 to 205544 May 10 00:38:45.239206 (sd-sysext)[1072]: Using extensions 'kubernetes'. May 10 00:38:45.239818 (sd-sysext)[1072]: Merged extensions into '/usr'. May 10 00:38:45.264669 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:45.266877 systemd[1]: Mounting usr-share-oem.mount... May 10 00:38:45.275421 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:38:45.278211 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:38:45.286604 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:38:45.294727 systemd[1]: Starting modprobe@loop.service... May 10 00:38:45.302247 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:38:45.302464 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:45.302665 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:45.307186 systemd[1]: Mounted usr-share-oem.mount. May 10 00:38:45.312152 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:38:45.314662 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:38:45.314882 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:38:45.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.323811 systemd[1]: Finished ldconfig.service. May 10 00:38:45.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.331661 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:38:45.331860 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:38:45.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.340733 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:38:45.340928 systemd[1]: Finished modprobe@loop.service. May 10 00:38:45.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.349985 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:38:45.350159 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:38:45.351682 systemd[1]: Finished systemd-sysext.service. May 10 00:38:45.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.361737 systemd[1]: Starting ensure-sysext.service... May 10 00:38:45.370461 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:38:45.382547 systemd[1]: Reloading. May 10 00:38:45.387607 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:38:45.391280 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:38:45.395133 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:38:45.461945 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-05-10T00:38:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:38:45.461995 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-05-10T00:38:45Z" level=info msg="torcx already run" May 10 00:38:45.648309 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:38:45.648335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:38:45.673124 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:38:45.750000 audit: BPF prog-id=24 op=LOAD May 10 00:38:45.750000 audit: BPF prog-id=15 op=UNLOAD May 10 00:38:45.750000 audit: BPF prog-id=25 op=LOAD May 10 00:38:45.751000 audit: BPF prog-id=26 op=LOAD May 10 00:38:45.751000 audit: BPF prog-id=16 op=UNLOAD May 10 00:38:45.751000 audit: BPF prog-id=17 op=UNLOAD May 10 00:38:45.754000 audit: BPF prog-id=27 op=LOAD May 10 00:38:45.754000 audit: BPF prog-id=28 op=LOAD May 10 00:38:45.754000 audit: BPF prog-id=18 op=UNLOAD May 10 00:38:45.754000 audit: BPF prog-id=19 op=UNLOAD May 10 00:38:45.755000 audit: BPF prog-id=29 op=LOAD May 10 00:38:45.755000 audit: BPF prog-id=21 op=UNLOAD May 10 00:38:45.755000 audit: BPF prog-id=30 op=LOAD May 10 00:38:45.755000 audit: BPF prog-id=31 op=LOAD May 10 00:38:45.755000 audit: BPF prog-id=22 op=UNLOAD May 10 00:38:45.755000 audit: BPF prog-id=23 op=UNLOAD May 10 00:38:45.756000 audit: BPF prog-id=32 op=LOAD May 10 00:38:45.756000 audit: BPF prog-id=20 op=UNLOAD May 10 00:38:45.761872 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:38:45.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.776778 systemd[1]: Starting audit-rules.service... May 10 00:38:45.785536 systemd[1]: Starting clean-ca-certificates.service... May 10 00:38:45.795887 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:38:45.805848 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:38:45.814000 audit: BPF prog-id=33 op=LOAD May 10 00:38:45.816838 systemd[1]: Starting systemd-resolved.service... May 10 00:38:45.824000 audit: BPF prog-id=34 op=LOAD May 10 00:38:45.826990 systemd[1]: Starting systemd-timesyncd.service... May 10 00:38:45.835933 systemd[1]: Starting systemd-update-utmp.service... May 10 00:38:45.847485 systemd[1]: Finished clean-ca-certificates.service. May 10 00:38:45.849000 audit[1170]: SYSTEM_BOOT pid=1170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:38:45.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:45.856791 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:38:45.856955 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:38:45.857000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:38:45.857000 audit[1173]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb99f0c50 a2=420 a3=0 items=0 ppid=1143 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:45.857000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:38:45.858855 augenrules[1173]: No rules May 10 00:38:45.865561 systemd[1]: Finished audit-rules.service. May 10 00:38:45.872417 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:38:45.889164 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:45.889710 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:38:45.892789 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:38:45.903222 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:38:45.912018 systemd[1]: Starting modprobe@loop.service... May 10 00:38:45.921079 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:38:45.929213 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:38:45.929559 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:45.931988 systemd[1]: Starting systemd-update-done.service... May 10 00:38:45.932615 enable-oslogin[1181]: /etc/pam.d/sshd already exists. Not enabling OS Login May 10 00:38:45.939171 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:38:45.939478 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:45.943491 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:38:45.943751 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:38:45.953066 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:38:45.953275 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:38:45.961978 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:38:45.962206 systemd[1]: Finished modprobe@loop.service. May 10 00:38:45.971012 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:38:45.971260 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:38:45.981112 systemd[1]: Finished systemd-update-done.service. May 10 00:38:45.990114 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:38:45.990340 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:38:45.992112 systemd[1]: Finished systemd-update-utmp.service. May 10 00:38:46.002999 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:46.003469 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:38:46.006123 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:38:46.014098 systemd-timesyncd[1165]: Contacted time server 169.254.169.254:123 (169.254.169.254). May 10 00:38:46.014544 systemd-timesyncd[1165]: Initial clock synchronization to Sat 2025-05-10 00:38:45.965624 UTC. May 10 00:38:46.015148 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:38:46.016463 systemd-resolved[1161]: Positive Trust Anchors: May 10 00:38:46.016481 systemd-resolved[1161]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:38:46.016535 systemd-resolved[1161]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:38:46.023608 systemd[1]: Starting modprobe@loop.service... May 10 00:38:46.031578 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:38:46.036829 enable-oslogin[1188]: /etc/pam.d/sshd already exists. Not enabling OS Login May 10 00:38:46.040196 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:38:46.040403 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:46.040593 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:38:46.040754 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:38:46.042555 systemd[1]: Started systemd-timesyncd.service. May 10 00:38:46.051164 systemd-resolved[1161]: Defaulting to hostname 'linux'. May 10 00:38:46.052513 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:38:46.052728 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:38:46.056188 systemd-networkd[1029]: eth0: Gained IPv6LL May 10 00:38:46.061489 systemd[1]: Started systemd-resolved.service. May 10 00:38:46.070600 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:38:46.070810 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:38:46.079620 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:38:46.079831 systemd[1]: Finished modprobe@loop.service. May 10 00:38:46.088628 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:38:46.088846 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:38:46.097836 systemd[1]: Reached target network.target. May 10 00:38:46.106274 systemd[1]: Reached target nss-lookup.target. May 10 00:38:46.114268 systemd[1]: Reached target time-set.target. May 10 00:38:46.122231 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:38:46.122473 systemd[1]: Reached target sysinit.target. May 10 00:38:46.131376 systemd[1]: Started motdgen.path. May 10 00:38:46.138357 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:38:46.148509 systemd[1]: Started logrotate.timer. May 10 00:38:46.155401 systemd[1]: Started mdadm.timer. May 10 00:38:46.162350 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:38:46.171241 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:38:46.171453 systemd[1]: Reached target paths.target. May 10 00:38:46.178258 systemd[1]: Reached target timers.target. May 10 00:38:46.185870 systemd[1]: Listening on dbus.socket. May 10 00:38:46.194807 systemd[1]: Starting docker.socket... May 10 00:38:46.206144 systemd[1]: Listening on sshd.socket. May 10 00:38:46.214374 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:46.214606 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:38:46.217667 systemd[1]: Listening on docker.socket. May 10 00:38:46.226623 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:38:46.226832 systemd[1]: Reached target sockets.target. May 10 00:38:46.235281 systemd[1]: Reached target basic.target. May 10 00:38:46.242250 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:38:46.242445 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:38:46.244187 systemd[1]: Starting containerd.service... May 10 00:38:46.252843 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:38:46.263111 systemd[1]: Starting dbus.service... May 10 00:38:46.271130 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:38:46.279921 systemd[1]: Starting extend-filesystems.service... May 10 00:38:46.284685 jq[1194]: false May 10 00:38:46.290175 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:38:46.292072 systemd[1]: Starting modprobe@drm.service... May 10 00:38:46.302503 systemd[1]: Starting motdgen.service... May 10 00:38:46.316281 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:38:46.327154 systemd[1]: Starting sshd-keygen.service... May 10 00:38:46.336223 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:38:46.340793 extend-filesystems[1195]: Found loop1 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda May 10 00:38:46.351253 extend-filesystems[1195]: Found sda1 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda2 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda3 May 10 00:38:46.351253 extend-filesystems[1195]: Found usr May 10 00:38:46.351253 extend-filesystems[1195]: Found sda4 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda6 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda7 May 10 00:38:46.351253 extend-filesystems[1195]: Found sda9 May 10 00:38:46.351253 extend-filesystems[1195]: Checking size of /dev/sda9 May 10 00:38:46.521537 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks May 10 00:38:46.521602 kernel: EXT4-fs (sda9): resized filesystem to 2538491 May 10 00:38:46.344295 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:38:46.424887 dbus-daemon[1193]: [system] SELinux support is enabled May 10 00:38:46.522357 extend-filesystems[1195]: Resized partition /dev/sda9 May 10 00:38:46.344578 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). May 10 00:38:46.566374 update_engine[1213]: I0510 00:38:46.498608 1213 main.cc:92] Flatcar Update Engine starting May 10 00:38:46.566374 update_engine[1213]: I0510 00:38:46.503808 1213 update_check_scheduler.cc:74] Next update check in 3m41s May 10 00:38:46.437568 dbus-daemon[1193]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:38:46.566926 extend-filesystems[1222]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:38:46.566926 extend-filesystems[1222]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required May 10 00:38:46.566926 extend-filesystems[1222]: old_desc_blocks = 1, new_desc_blocks = 2 May 10 00:38:46.566926 extend-filesystems[1222]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. May 10 00:38:46.345384 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:38:46.677338 jq[1215]: true May 10 00:38:46.486945 dbus-daemon[1193]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:38:46.677677 extend-filesystems[1195]: Resized filesystem in /dev/sda9 May 10 00:38:46.346940 systemd[1]: Starting update-engine.service... May 10 00:38:46.360555 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:38:46.686685 jq[1226]: true May 10 00:38:46.375843 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:38:46.687081 env[1227]: time="2025-05-10T00:38:46.671337206Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:38:46.376611 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:38:46.378009 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:38:46.687827 bash[1248]: Updated "/home/core/.ssh/authorized_keys" May 10 00:38:46.378703 systemd[1]: Finished modprobe@drm.service. May 10 00:38:46.383186 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:38:46.383409 systemd[1]: Finished motdgen.service. May 10 00:38:46.396244 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:38:46.396472 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:38:46.429660 systemd[1]: Started dbus.service. May 10 00:38:46.689445 mkfs.ext4[1254]: mke2fs 1.46.5 (30-Dec-2021) May 10 00:38:46.689445 mkfs.ext4[1254]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done May 10 00:38:46.689445 mkfs.ext4[1254]: Creating filesystem with 262144 4k blocks and 65536 inodes May 10 00:38:46.689445 mkfs.ext4[1254]: Filesystem UUID: 22a35e2f-64cd-43a1-b33e-3725b7124fc6 May 10 00:38:46.689445 mkfs.ext4[1254]: Superblock backups stored on blocks: May 10 00:38:46.689445 mkfs.ext4[1254]: 32768, 98304, 163840, 229376 May 10 00:38:46.689445 mkfs.ext4[1254]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:38:46.689445 mkfs.ext4[1254]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:38:46.689445 mkfs.ext4[1254]: Creating journal (8192 blocks): done May 10 00:38:46.689445 mkfs.ext4[1254]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:38:46.450161 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:38:46.464570 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:38:46.464850 systemd[1]: Finished extend-filesystems.service. May 10 00:38:46.690492 umount[1258]: umount: /var/lib/flatcar-oem-gce.img: not mounted. May 10 00:38:46.484468 systemd[1]: Finished ensure-sysext.service. May 10 00:38:46.496529 systemd[1]: Reached target network-online.target. May 10 00:38:46.507294 systemd[1]: Starting kubelet.service... May 10 00:38:46.529844 systemd[1]: Starting oem-gce.service... May 10 00:38:46.537174 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:38:46.537236 systemd[1]: Reached target system-config.target. May 10 00:38:46.550900 systemd[1]: Starting systemd-hostnamed.service... May 10 00:38:46.577242 systemd[1]: Starting systemd-logind.service... May 10 00:38:46.584253 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:38:46.584342 systemd[1]: Reached target user-config.target. May 10 00:38:46.593923 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:38:46.610946 systemd[1]: Started update-engine.service. May 10 00:38:46.623189 systemd[1]: Started locksmithd.service. May 10 00:38:46.732068 kernel: loop2: detected capacity change from 0 to 2097152 May 10 00:38:46.735344 coreos-metadata[1192]: May 10 00:38:46.735 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 May 10 00:38:46.740963 coreos-metadata[1192]: May 10 00:38:46.740 INFO Fetch failed with 404: resource not found May 10 00:38:46.741096 coreos-metadata[1192]: May 10 00:38:46.740 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 May 10 00:38:46.743200 coreos-metadata[1192]: May 10 00:38:46.743 INFO Fetch successful May 10 00:38:46.743330 coreos-metadata[1192]: May 10 00:38:46.743 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 May 10 00:38:46.744547 coreos-metadata[1192]: May 10 00:38:46.744 INFO Fetch failed with 404: resource not found May 10 00:38:46.744547 coreos-metadata[1192]: May 10 00:38:46.744 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 May 10 00:38:46.744547 coreos-metadata[1192]: May 10 00:38:46.744 INFO Fetch failed with 404: resource not found May 10 00:38:46.744547 coreos-metadata[1192]: May 10 00:38:46.744 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 May 10 00:38:46.745094 coreos-metadata[1192]: May 10 00:38:46.745 INFO Fetch successful May 10 00:38:46.749195 unknown[1192]: wrote ssh authorized keys file for user: core May 10 00:38:46.793196 update-ssh-keys[1262]: Updated "/home/core/.ssh/authorized_keys" May 10 00:38:46.793816 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:38:46.807760 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:38:46.830395 env[1227]: time="2025-05-10T00:38:46.830327751Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:38:46.830566 env[1227]: time="2025-05-10T00:38:46.830510583Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.833395 env[1227]: time="2025-05-10T00:38:46.833347277Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:38:46.834196 env[1227]: time="2025-05-10T00:38:46.834164147Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.834681 env[1227]: time="2025-05-10T00:38:46.834648693Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:38:46.834842 env[1227]: time="2025-05-10T00:38:46.834819742Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.834966 env[1227]: time="2025-05-10T00:38:46.834944065Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:38:46.835100 env[1227]: time="2025-05-10T00:38:46.835078923Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.835355 env[1227]: time="2025-05-10T00:38:46.835318108Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.837181 env[1227]: time="2025-05-10T00:38:46.837138765Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:38:46.838257 env[1227]: time="2025-05-10T00:38:46.838209574Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:38:46.840926 env[1227]: time="2025-05-10T00:38:46.840894003Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:38:46.841178 env[1227]: time="2025-05-10T00:38:46.841150950Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:38:46.842638 env[1227]: time="2025-05-10T00:38:46.842607437Z" level=info msg="metadata content store policy set" policy=shared May 10 00:38:46.853165 env[1227]: time="2025-05-10T00:38:46.853104449Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:38:46.853356 env[1227]: time="2025-05-10T00:38:46.853331166Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:38:46.853498 env[1227]: time="2025-05-10T00:38:46.853477086Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:38:46.853721 env[1227]: time="2025-05-10T00:38:46.853638808Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:38:46.853859 env[1227]: time="2025-05-10T00:38:46.853837760Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:38:46.853979 env[1227]: time="2025-05-10T00:38:46.853942007Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:38:46.854111 env[1227]: time="2025-05-10T00:38:46.854089607Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:38:46.854234 env[1227]: time="2025-05-10T00:38:46.854213172Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:38:46.854349 env[1227]: time="2025-05-10T00:38:46.854326717Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:38:46.859570 env[1227]: time="2025-05-10T00:38:46.859529735Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:38:46.860070 env[1227]: time="2025-05-10T00:38:46.860024173Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:38:46.860239 env[1227]: time="2025-05-10T00:38:46.860178878Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:38:46.860996 env[1227]: time="2025-05-10T00:38:46.860967863Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:38:46.863216 env[1227]: time="2025-05-10T00:38:46.863186892Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:38:46.863877 env[1227]: time="2025-05-10T00:38:46.863850176Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:38:46.869131 env[1227]: time="2025-05-10T00:38:46.869098332Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:38:46.869274 env[1227]: time="2025-05-10T00:38:46.869249901Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:38:46.869484 env[1227]: time="2025-05-10T00:38:46.869461706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:38:46.869677 env[1227]: time="2025-05-10T00:38:46.869654957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:38:46.870840 env[1227]: time="2025-05-10T00:38:46.870809558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:38:46.873112 env[1227]: time="2025-05-10T00:38:46.873079767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:38:46.873254 env[1227]: time="2025-05-10T00:38:46.873230604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:38:46.873371 env[1227]: time="2025-05-10T00:38:46.873349711Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:38:46.873474 env[1227]: time="2025-05-10T00:38:46.873454101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:38:46.873572 env[1227]: time="2025-05-10T00:38:46.873551717Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:38:46.876307 env[1227]: time="2025-05-10T00:38:46.876267481Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:38:46.876585 env[1227]: time="2025-05-10T00:38:46.876559832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:38:46.876711 env[1227]: time="2025-05-10T00:38:46.876688945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:38:46.876820 env[1227]: time="2025-05-10T00:38:46.876798943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:38:46.876929 env[1227]: time="2025-05-10T00:38:46.876905859Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:38:46.877060 env[1227]: time="2025-05-10T00:38:46.877015743Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:38:46.878393 env[1227]: time="2025-05-10T00:38:46.878361529Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:38:46.878535 env[1227]: time="2025-05-10T00:38:46.878508491Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:38:46.878682 env[1227]: time="2025-05-10T00:38:46.878644889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:38:46.879191 env[1227]: time="2025-05-10T00:38:46.879100909Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:38:46.883369 env[1227]: time="2025-05-10T00:38:46.879385412Z" level=info msg="Connect containerd service" May 10 00:38:46.883369 env[1227]: time="2025-05-10T00:38:46.879446658Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:38:46.889236 env[1227]: time="2025-05-10T00:38:46.889199007Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:38:46.890525 env[1227]: time="2025-05-10T00:38:46.890495659Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:38:46.891792 env[1227]: time="2025-05-10T00:38:46.891762333Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:38:46.892057 systemd[1]: Started containerd.service. May 10 00:38:46.892506 env[1227]: time="2025-05-10T00:38:46.892479001Z" level=info msg="containerd successfully booted in 0.222123s" May 10 00:38:46.897325 env[1227]: time="2025-05-10T00:38:46.897259691Z" level=info msg="Start subscribing containerd event" May 10 00:38:46.897732 systemd-logind[1250]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:38:46.898966 systemd-logind[1250]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:38:46.899437 systemd-logind[1250]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:38:46.905902 systemd-logind[1250]: New seat seat0. May 10 00:38:46.917477 systemd[1]: Started systemd-logind.service. May 10 00:38:46.957343 env[1227]: time="2025-05-10T00:38:46.957281175Z" level=info msg="Start recovering state" May 10 00:38:46.959423 env[1227]: time="2025-05-10T00:38:46.959387715Z" level=info msg="Start event monitor" May 10 00:38:46.959620 env[1227]: time="2025-05-10T00:38:46.959579468Z" level=info msg="Start snapshots syncer" May 10 00:38:46.959748 env[1227]: time="2025-05-10T00:38:46.959727453Z" level=info msg="Start cni network conf syncer for default" May 10 00:38:46.960323 env[1227]: time="2025-05-10T00:38:46.960295652Z" level=info msg="Start streaming server" May 10 00:38:46.983154 dbus-daemon[1193]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:38:46.983353 systemd[1]: Started systemd-hostnamed.service. May 10 00:38:46.984243 dbus-daemon[1193]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1249 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:38:46.998991 systemd[1]: Starting polkit.service... May 10 00:38:47.048973 polkitd[1269]: Started polkitd version 121 May 10 00:38:47.071446 polkitd[1269]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:38:47.071538 polkitd[1269]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:38:47.073500 polkitd[1269]: Finished loading, compiling and executing 2 rules May 10 00:38:47.074125 dbus-daemon[1193]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:38:47.074544 systemd[1]: Started polkit.service. May 10 00:38:47.074698 polkitd[1269]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:38:47.092140 systemd-hostnamed[1249]: Hostname set to (transient) May 10 00:38:47.095165 systemd-resolved[1161]: System hostname changed to 'ci-3510-3-7-nightly-20250509-2100-eba2b36055ef93f5bec3'. May 10 00:38:48.411175 systemd[1]: Started kubelet.service. May 10 00:38:49.191801 sshd_keygen[1219]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:38:49.266770 systemd[1]: Finished sshd-keygen.service. May 10 00:38:49.277633 systemd[1]: Starting issuegen.service... May 10 00:38:49.290244 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:38:49.290487 systemd[1]: Finished issuegen.service. May 10 00:38:49.294437 locksmithd[1255]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:38:49.298948 systemd[1]: Starting systemd-user-sessions.service... May 10 00:38:49.314643 systemd[1]: Finished systemd-user-sessions.service. May 10 00:38:49.324295 systemd[1]: Started getty@tty1.service. May 10 00:38:49.335538 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:38:49.345570 systemd[1]: Reached target getty.target. May 10 00:38:49.588399 kubelet[1278]: E0510 00:38:49.588270 1278 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:38:49.591136 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:38:49.591374 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:38:49.591743 systemd[1]: kubelet.service: Consumed 1.386s CPU time. May 10 00:38:51.871987 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. May 10 00:38:54.152077 kernel: loop2: detected capacity change from 0 to 2097152 May 10 00:38:54.172144 systemd-nspawn[1303]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. May 10 00:38:54.172144 systemd-nspawn[1303]: Press ^] three times within 1s to kill container. May 10 00:38:54.185087 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:38:54.264401 systemd[1]: Started oem-gce.service. May 10 00:38:54.272609 systemd[1]: Reached target multi-user.target. May 10 00:38:54.284346 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:38:54.298638 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:38:54.298882 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:38:54.308326 systemd[1]: Startup finished in 964ms (kernel) + 6.819s (initrd) + 15.708s (userspace) = 23.493s. May 10 00:38:54.321611 systemd-nspawn[1303]: + '[' -e /etc/default/instance_configs.cfg.template ']' May 10 00:38:54.321611 systemd-nspawn[1303]: + echo -e '[InstanceSetup]\nset_host_keys = false' May 10 00:38:54.321825 systemd-nspawn[1303]: + /usr/bin/google_instance_setup May 10 00:38:54.912514 instance-setup[1309]: INFO Running google_set_multiqueue. May 10 00:38:54.927825 instance-setup[1309]: INFO Set channels for eth0 to 2. May 10 00:38:54.931632 instance-setup[1309]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. May 10 00:38:54.933121 instance-setup[1309]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 May 10 00:38:54.933487 instance-setup[1309]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. May 10 00:38:54.934829 instance-setup[1309]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 May 10 00:38:54.935293 instance-setup[1309]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. May 10 00:38:54.936732 instance-setup[1309]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 May 10 00:38:54.937083 instance-setup[1309]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. May 10 00:38:54.938437 instance-setup[1309]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 May 10 00:38:54.950338 instance-setup[1309]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus May 10 00:38:54.950839 instance-setup[1309]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus May 10 00:38:54.987680 systemd-nspawn[1303]: + /usr/bin/google_metadata_script_runner --script-type startup May 10 00:38:55.306367 startup-script[1340]: INFO Starting startup scripts. May 10 00:38:55.318788 startup-script[1340]: INFO No startup scripts found in metadata. May 10 00:38:55.318950 startup-script[1340]: INFO Finished running startup scripts. May 10 00:38:55.350696 systemd-nspawn[1303]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM May 10 00:38:55.350696 systemd-nspawn[1303]: + daemon_pids=() May 10 00:38:55.351388 systemd-nspawn[1303]: + for d in accounts clock_skew network May 10 00:38:55.351388 systemd-nspawn[1303]: + daemon_pids+=($!) May 10 00:38:55.351388 systemd-nspawn[1303]: + for d in accounts clock_skew network May 10 00:38:55.351675 systemd-nspawn[1303]: + daemon_pids+=($!) May 10 00:38:55.351784 systemd-nspawn[1303]: + for d in accounts clock_skew network May 10 00:38:55.352090 systemd-nspawn[1303]: + daemon_pids+=($!) May 10 00:38:55.352305 systemd-nspawn[1303]: + /usr/bin/google_network_daemon May 10 00:38:55.352438 systemd-nspawn[1303]: + NOTIFY_SOCKET=/run/systemd/notify May 10 00:38:55.352438 systemd-nspawn[1303]: + /usr/bin/systemd-notify --ready May 10 00:38:55.353318 systemd-nspawn[1303]: + /usr/bin/google_clock_skew_daemon May 10 00:38:55.353846 systemd-nspawn[1303]: + /usr/bin/google_accounts_daemon May 10 00:38:55.405364 systemd-nspawn[1303]: + wait -n 36 37 38 May 10 00:38:55.777528 systemd[1]: Created slice system-sshd.slice. May 10 00:38:55.781761 systemd[1]: Started sshd@0-10.128.0.76:22-147.75.109.163:36224.service. May 10 00:38:55.968896 google-clock-skew[1344]: INFO Starting Google Clock Skew daemon. May 10 00:38:55.982114 google-clock-skew[1344]: INFO Clock drift token has changed: 0. May 10 00:38:55.996507 systemd-nspawn[1303]: hwclock: Cannot access the Hardware Clock via any known method. May 10 00:38:55.996908 systemd-nspawn[1303]: hwclock: Use the --verbose option to see the details of our search for an access method. May 10 00:38:55.999998 google-clock-skew[1344]: WARNING Failed to sync system time with hardware clock. May 10 00:38:56.038796 groupadd[1356]: group added to /etc/group: name=google-sudoers, GID=1000 May 10 00:38:56.044319 groupadd[1356]: group added to /etc/gshadow: name=google-sudoers May 10 00:38:56.055833 groupadd[1356]: new group: name=google-sudoers, GID=1000 May 10 00:38:56.073084 google-accounts[1343]: INFO Starting Google Accounts daemon. May 10 00:38:56.110191 sshd[1350]: Accepted publickey for core from 147.75.109.163 port 36224 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:56.112682 google-accounts[1343]: WARNING OS Login not installed. May 10 00:38:56.113223 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:56.114960 google-accounts[1343]: INFO Creating a new user account for 0. May 10 00:38:56.130966 systemd[1]: Created slice user-500.slice. May 10 00:38:56.132984 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:38:56.140494 systemd-logind[1250]: New session 1 of user core. May 10 00:38:56.143626 systemd-nspawn[1303]: useradd: invalid user name '0': use --badname to ignore May 10 00:38:56.144543 google-accounts[1343]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. May 10 00:38:56.149499 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:38:56.151955 systemd[1]: Starting user@500.service... May 10 00:38:56.170862 (systemd)[1368]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:56.173835 google-networking[1345]: INFO Starting Google Networking daemon. May 10 00:38:56.277131 systemd[1368]: Queued start job for default target default.target. May 10 00:38:56.277839 systemd[1368]: Reached target paths.target. May 10 00:38:56.277876 systemd[1368]: Reached target sockets.target. May 10 00:38:56.277899 systemd[1368]: Reached target timers.target. May 10 00:38:56.277921 systemd[1368]: Reached target basic.target. May 10 00:38:56.278095 systemd[1]: Started user@500.service. May 10 00:38:56.279605 systemd[1]: Started session-1.scope. May 10 00:38:56.280464 systemd[1368]: Reached target default.target. May 10 00:38:56.280715 systemd[1368]: Startup finished in 97ms. May 10 00:38:56.501061 systemd[1]: Started sshd@1-10.128.0.76:22-147.75.109.163:36234.service. May 10 00:38:56.785712 sshd[1378]: Accepted publickey for core from 147.75.109.163 port 36234 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:56.787497 sshd[1378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:56.793917 systemd-logind[1250]: New session 2 of user core. May 10 00:38:56.794635 systemd[1]: Started session-2.scope. May 10 00:38:56.999067 sshd[1378]: pam_unix(sshd:session): session closed for user core May 10 00:38:57.004366 systemd[1]: sshd@1-10.128.0.76:22-147.75.109.163:36234.service: Deactivated successfully. May 10 00:38:57.005437 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:38:57.006316 systemd-logind[1250]: Session 2 logged out. Waiting for processes to exit. May 10 00:38:57.008589 systemd-logind[1250]: Removed session 2. May 10 00:38:57.044738 systemd[1]: Started sshd@2-10.128.0.76:22-147.75.109.163:45268.service. May 10 00:38:57.331366 sshd[1384]: Accepted publickey for core from 147.75.109.163 port 45268 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:57.332977 sshd[1384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:57.339682 systemd[1]: Started session-3.scope. May 10 00:38:57.340357 systemd-logind[1250]: New session 3 of user core. May 10 00:38:57.539146 sshd[1384]: pam_unix(sshd:session): session closed for user core May 10 00:38:57.543320 systemd[1]: sshd@2-10.128.0.76:22-147.75.109.163:45268.service: Deactivated successfully. May 10 00:38:57.544386 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:38:57.545294 systemd-logind[1250]: Session 3 logged out. Waiting for processes to exit. May 10 00:38:57.546679 systemd-logind[1250]: Removed session 3. May 10 00:38:57.585226 systemd[1]: Started sshd@3-10.128.0.76:22-147.75.109.163:45270.service. May 10 00:38:57.872696 sshd[1390]: Accepted publickey for core from 147.75.109.163 port 45270 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:57.874727 sshd[1390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:57.881522 systemd[1]: Started session-4.scope. May 10 00:38:57.882467 systemd-logind[1250]: New session 4 of user core. May 10 00:38:58.087578 sshd[1390]: pam_unix(sshd:session): session closed for user core May 10 00:38:58.091490 systemd[1]: sshd@3-10.128.0.76:22-147.75.109.163:45270.service: Deactivated successfully. May 10 00:38:58.092536 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:38:58.093494 systemd-logind[1250]: Session 4 logged out. Waiting for processes to exit. May 10 00:38:58.094680 systemd-logind[1250]: Removed session 4. May 10 00:38:58.133646 systemd[1]: Started sshd@4-10.128.0.76:22-147.75.109.163:45284.service. May 10 00:38:58.421269 sshd[1396]: Accepted publickey for core from 147.75.109.163 port 45284 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:58.422934 sshd[1396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:58.429449 systemd[1]: Started session-5.scope. May 10 00:38:58.430237 systemd-logind[1250]: New session 5 of user core. May 10 00:38:58.615654 sudo[1399]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:38:58.616097 sudo[1399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:38:58.625286 dbus-daemon[1193]: \xd0\xcd\xf4\xb4\xbdU: received setenforce notice (enforcing=1120634832) May 10 00:38:58.627425 sudo[1399]: pam_unix(sudo:session): session closed for user root May 10 00:38:58.671324 sshd[1396]: pam_unix(sshd:session): session closed for user core May 10 00:38:58.675737 systemd[1]: sshd@4-10.128.0.76:22-147.75.109.163:45284.service: Deactivated successfully. May 10 00:38:58.677005 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:38:58.678009 systemd-logind[1250]: Session 5 logged out. Waiting for processes to exit. May 10 00:38:58.679447 systemd-logind[1250]: Removed session 5. May 10 00:38:58.717249 systemd[1]: Started sshd@5-10.128.0.76:22-147.75.109.163:45286.service. May 10 00:38:59.005446 sshd[1403]: Accepted publickey for core from 147.75.109.163 port 45286 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:59.007010 sshd[1403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:59.013580 systemd[1]: Started session-6.scope. May 10 00:38:59.014201 systemd-logind[1250]: New session 6 of user core. May 10 00:38:59.182624 sudo[1407]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:38:59.183034 sudo[1407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:38:59.187279 sudo[1407]: pam_unix(sudo:session): session closed for user root May 10 00:38:59.199054 sudo[1406]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:38:59.199475 sudo[1406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:38:59.211521 systemd[1]: Stopping audit-rules.service... May 10 00:38:59.212000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:38:59.214253 auditctl[1410]: No rules May 10 00:38:59.216447 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:38:59.216683 systemd[1]: Stopped audit-rules.service. May 10 00:38:59.233512 kernel: kauditd_printk_skb: 206 callbacks suppressed May 10 00:38:59.233617 kernel: audit: type=1305 audit(1746837539.212:187): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:38:59.219584 systemd[1]: Starting audit-rules.service... May 10 00:38:59.212000 audit[1410]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffebce4b3f0 a2=420 a3=0 items=0 ppid=1 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:59.256323 systemd[1]: Finished audit-rules.service. May 10 00:38:59.258483 augenrules[1427]: No rules May 10 00:38:59.264366 kernel: audit: type=1300 audit(1746837539.212:187): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffebce4b3f0 a2=420 a3=0 items=0 ppid=1 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:59.266177 kernel: audit: type=1327 audit(1746837539.212:187): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:38:59.212000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:38:59.264593 sudo[1406]: pam_unix(sudo:session): session closed for user root May 10 00:38:59.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.295420 kernel: audit: type=1131 audit(1746837539.215:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.295509 kernel: audit: type=1130 audit(1746837539.255:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.263000 audit[1406]: USER_END pid=1406 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.319980 sshd[1403]: pam_unix(sshd:session): session closed for user core May 10 00:38:59.325272 systemd[1]: sshd@5-10.128.0.76:22-147.75.109.163:45286.service: Deactivated successfully. May 10 00:38:59.326387 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:38:59.328185 systemd-logind[1250]: Session 6 logged out. Waiting for processes to exit. May 10 00:38:59.329791 systemd-logind[1250]: Removed session 6. May 10 00:38:59.342239 kernel: audit: type=1106 audit(1746837539.263:190): pid=1406 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.342338 kernel: audit: type=1104 audit(1746837539.263:191): pid=1406 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.263000 audit[1406]: CRED_DISP pid=1406 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.397422 kernel: audit: type=1106 audit(1746837539.316:192): pid=1403 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.316000 audit[1403]: USER_END pid=1403 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.316000 audit[1403]: CRED_DISP pid=1403 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.378182 systemd[1]: Started sshd@6-10.128.0.76:22-147.75.109.163:45300.service. May 10 00:38:59.398488 kernel: audit: type=1104 audit(1746837539.316:193): pid=1403 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.76:22-147.75.109.163:45286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.422113 kernel: audit: type=1131 audit(1746837539.322:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.76:22-147.75.109.163:45286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.76:22-147.75.109.163:45300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.626179 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:38:59.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.626596 systemd[1]: Stopped kubelet.service. May 10 00:38:59.626698 systemd[1]: kubelet.service: Consumed 1.386s CPU time. May 10 00:38:59.630225 systemd[1]: Starting kubelet.service... May 10 00:38:59.685000 audit[1433]: USER_ACCT pid=1433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.686644 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 45300 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:38:59.686000 audit[1433]: CRED_ACQ pid=1433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.687000 audit[1433]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda0b91ba0 a2=3 a3=0 items=0 ppid=1 pid=1433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:38:59.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:38:59.688705 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:38:59.696030 systemd[1]: Started session-7.scope. May 10 00:38:59.698412 systemd-logind[1250]: New session 7 of user core. May 10 00:38:59.705000 audit[1433]: USER_START pid=1433 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.708000 audit[1437]: CRED_ACQ pid=1437 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:38:59.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:38:59.862291 systemd[1]: Started kubelet.service. May 10 00:38:59.871000 audit[1438]: USER_ACCT pid=1438 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.872252 sudo[1438]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:38:59.871000 audit[1438]: CRED_REFR pid=1438 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.873085 sudo[1438]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:38:59.875000 audit[1438]: USER_START pid=1438 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:38:59.896868 systemd[1]: Starting coreos-metadata.service... May 10 00:38:59.948966 kubelet[1441]: E0510 00:38:59.948911 1441 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:38:59.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:38:59.953940 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:38:59.954187 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:38:59.971388 coreos-metadata[1450]: May 10 00:38:59.971 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 May 10 00:38:59.972251 coreos-metadata[1450]: May 10 00:38:59.972 INFO Fetch successful May 10 00:38:59.972448 coreos-metadata[1450]: May 10 00:38:59.972 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 May 10 00:38:59.973079 coreos-metadata[1450]: May 10 00:38:59.972 INFO Fetch successful May 10 00:38:59.973178 coreos-metadata[1450]: May 10 00:38:59.973 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 May 10 00:38:59.973594 coreos-metadata[1450]: May 10 00:38:59.973 INFO Fetch successful May 10 00:38:59.973594 coreos-metadata[1450]: May 10 00:38:59.973 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 May 10 00:38:59.974006 coreos-metadata[1450]: May 10 00:38:59.973 INFO Fetch successful May 10 00:38:59.983898 systemd[1]: Finished coreos-metadata.service. May 10 00:38:59.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:00.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:00.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:00.803419 systemd[1]: Stopped kubelet.service. May 10 00:39:00.807183 systemd[1]: Starting kubelet.service... May 10 00:39:00.852155 systemd[1]: Reloading. May 10 00:39:00.981645 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2025-05-10T00:39:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:39:00.982167 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2025-05-10T00:39:00Z" level=info msg="torcx already run" May 10 00:39:01.103275 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:39:01.103300 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:39:01.127400 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit: BPF prog-id=43 op=LOAD May 10 00:39:01.217000 audit: BPF prog-id=24 op=UNLOAD May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit: BPF prog-id=44 op=LOAD May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.218000 audit: BPF prog-id=45 op=LOAD May 10 00:39:01.218000 audit: BPF prog-id=25 op=UNLOAD May 10 00:39:01.218000 audit: BPF prog-id=26 op=UNLOAD May 10 00:39:01.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit: BPF prog-id=46 op=LOAD May 10 00:39:01.222000 audit: BPF prog-id=38 op=UNLOAD May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit: BPF prog-id=47 op=LOAD May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.222000 audit: BPF prog-id=48 op=LOAD May 10 00:39:01.222000 audit: BPF prog-id=39 op=UNLOAD May 10 00:39:01.222000 audit: BPF prog-id=40 op=UNLOAD May 10 00:39:01.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.223000 audit: BPF prog-id=49 op=LOAD May 10 00:39:01.223000 audit: BPF prog-id=41 op=UNLOAD May 10 00:39:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit: BPF prog-id=50 op=LOAD May 10 00:39:01.251000 audit: BPF prog-id=35 op=UNLOAD May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit: BPF prog-id=51 op=LOAD May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.251000 audit: BPF prog-id=52 op=LOAD May 10 00:39:01.251000 audit: BPF prog-id=36 op=UNLOAD May 10 00:39:01.251000 audit: BPF prog-id=37 op=UNLOAD May 10 00:39:01.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.256000 audit: BPF prog-id=53 op=LOAD May 10 00:39:01.256000 audit: BPF prog-id=34 op=UNLOAD May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit: BPF prog-id=54 op=LOAD May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit: BPF prog-id=55 op=LOAD May 10 00:39:01.258000 audit: BPF prog-id=27 op=UNLOAD May 10 00:39:01.258000 audit: BPF prog-id=28 op=UNLOAD May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit: BPF prog-id=56 op=LOAD May 10 00:39:01.259000 audit: BPF prog-id=29 op=UNLOAD May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit: BPF prog-id=57 op=LOAD May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.259000 audit: BPF prog-id=58 op=LOAD May 10 00:39:01.259000 audit: BPF prog-id=30 op=UNLOAD May 10 00:39:01.259000 audit: BPF prog-id=31 op=UNLOAD May 10 00:39:01.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.261000 audit: BPF prog-id=59 op=LOAD May 10 00:39:01.261000 audit: BPF prog-id=32 op=UNLOAD May 10 00:39:01.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:01.262000 audit: BPF prog-id=60 op=LOAD May 10 00:39:01.262000 audit: BPF prog-id=33 op=UNLOAD May 10 00:39:01.286819 systemd[1]: Started kubelet.service. May 10 00:39:01.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:01.291016 systemd[1]: Stopping kubelet.service... May 10 00:39:01.291748 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:39:01.292092 systemd[1]: Stopped kubelet.service. May 10 00:39:01.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:01.294261 systemd[1]: Starting kubelet.service... May 10 00:39:01.542626 systemd[1]: Started kubelet.service. May 10 00:39:01.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:01.595131 kubelet[1553]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:39:01.595131 kubelet[1553]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:39:01.595131 kubelet[1553]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:39:01.597214 kubelet[1553]: I0510 00:39:01.597144 1553 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:39:02.219157 kubelet[1553]: I0510 00:39:02.219097 1553 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:39:02.219157 kubelet[1553]: I0510 00:39:02.219138 1553 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:39:02.219592 kubelet[1553]: I0510 00:39:02.219553 1553 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:39:02.286144 kubelet[1553]: I0510 00:39:02.285474 1553 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:39:02.308196 kubelet[1553]: E0510 00:39:02.308138 1553 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:39:02.308407 kubelet[1553]: I0510 00:39:02.308385 1553 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:39:02.314248 kubelet[1553]: I0510 00:39:02.314197 1553 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:39:02.314397 kubelet[1553]: I0510 00:39:02.314373 1553 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:39:02.314640 kubelet[1553]: I0510 00:39:02.314583 1553 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:39:02.314909 kubelet[1553]: I0510 00:39:02.314641 1553 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.76","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:39:02.315149 kubelet[1553]: I0510 00:39:02.314930 1553 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:39:02.315149 kubelet[1553]: I0510 00:39:02.314949 1553 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:39:02.315149 kubelet[1553]: I0510 00:39:02.315101 1553 state_mem.go:36] "Initialized new in-memory state store" May 10 00:39:02.318372 kubelet[1553]: I0510 00:39:02.318330 1553 kubelet.go:408] "Attempting to sync node with API server" May 10 00:39:02.318372 kubelet[1553]: I0510 00:39:02.318368 1553 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:39:02.318515 kubelet[1553]: I0510 00:39:02.318416 1553 kubelet.go:314] "Adding apiserver pod source" May 10 00:39:02.318515 kubelet[1553]: I0510 00:39:02.318443 1553 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:39:02.321818 kubelet[1553]: E0510 00:39:02.321763 1553 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:02.321952 kubelet[1553]: E0510 00:39:02.321857 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:02.337391 kubelet[1553]: I0510 00:39:02.337352 1553 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:39:02.340779 kubelet[1553]: I0510 00:39:02.340727 1553 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:39:02.341805 kubelet[1553]: W0510 00:39:02.341765 1553 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:39:02.342567 kubelet[1553]: I0510 00:39:02.342533 1553 server.go:1269] "Started kubelet" May 10 00:39:02.346711 kubelet[1553]: I0510 00:39:02.346652 1553 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:39:02.348106 kubelet[1553]: I0510 00:39:02.348080 1553 server.go:460] "Adding debug handlers to kubelet server" May 10 00:39:02.349000 audit[1553]: AVC avc: denied { mac_admin } for pid=1553 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:02.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:39:02.349000 audit[1553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008d8300 a1=c0006289a8 a2=c0008d82d0 a3=25 items=0 ppid=1 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:39:02.349000 audit[1553]: AVC avc: denied { mac_admin } for pid=1553 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:02.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:39:02.349000 audit[1553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e1480 a1=c0006289c0 a2=c0008d8390 a3=25 items=0 ppid=1 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:39:02.351649 kubelet[1553]: I0510 00:39:02.350775 1553 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:39:02.351649 kubelet[1553]: I0510 00:39:02.350834 1553 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:39:02.351649 kubelet[1553]: I0510 00:39:02.350910 1553 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:39:02.353979 kubelet[1553]: I0510 00:39:02.353917 1553 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:39:02.354384 kubelet[1553]: I0510 00:39:02.354360 1553 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:39:02.358503 kubelet[1553]: I0510 00:39:02.358463 1553 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:39:02.361162 kubelet[1553]: I0510 00:39:02.361123 1553 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:39:02.361420 kubelet[1553]: E0510 00:39:02.361390 1553 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.76\" not found" May 10 00:39:02.361938 kubelet[1553]: E0510 00:39:02.361914 1553 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:39:02.362824 kubelet[1553]: I0510 00:39:02.362015 1553 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:39:02.362824 kubelet[1553]: I0510 00:39:02.362218 1553 reconciler.go:26] "Reconciler: start to sync state" May 10 00:39:02.363000 kubelet[1553]: I0510 00:39:02.362889 1553 factory.go:221] Registration of the systemd container factory successfully May 10 00:39:02.363000 kubelet[1553]: I0510 00:39:02.362976 1553 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:39:02.365371 kubelet[1553]: I0510 00:39:02.365349 1553 factory.go:221] Registration of the containerd container factory successfully May 10 00:39:02.370677 kubelet[1553]: E0510 00:39:02.370652 1553 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.76\" not found" node="10.128.0.76" May 10 00:39:02.383034 kubelet[1553]: I0510 00:39:02.383006 1553 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:39:02.383034 kubelet[1553]: I0510 00:39:02.383029 1553 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:39:02.383209 kubelet[1553]: I0510 00:39:02.383082 1553 state_mem.go:36] "Initialized new in-memory state store" May 10 00:39:02.385639 kubelet[1553]: I0510 00:39:02.385616 1553 policy_none.go:49] "None policy: Start" May 10 00:39:02.386550 kubelet[1553]: I0510 00:39:02.386529 1553 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:39:02.386738 kubelet[1553]: I0510 00:39:02.386708 1553 state_mem.go:35] "Initializing new in-memory state store" May 10 00:39:02.398238 systemd[1]: Created slice kubepods.slice. May 10 00:39:02.406436 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:39:02.412197 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:39:02.420471 kubelet[1553]: I0510 00:39:02.420426 1553 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:39:02.419000 audit[1553]: AVC avc: denied { mac_admin } for pid=1553 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:02.419000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:39:02.419000 audit[1553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d83d40 a1=c000dcec30 a2=c000d83d10 a3=25 items=0 ppid=1 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.419000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:39:02.420896 kubelet[1553]: I0510 00:39:02.420577 1553 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:39:02.420896 kubelet[1553]: I0510 00:39:02.420767 1553 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:39:02.420896 kubelet[1553]: I0510 00:39:02.420783 1553 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:39:02.426060 kubelet[1553]: I0510 00:39:02.423400 1553 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:39:02.429076 kubelet[1553]: E0510 00:39:02.428529 1553 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.76\" not found" May 10 00:39:02.431000 audit[1570]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.431000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff07798030 a2=0 a3=7fff0779801c items=0 ppid=1553 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:39:02.433000 audit[1572]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.433000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff7dcd40d0 a2=0 a3=7fff7dcd40bc items=0 ppid=1553 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:39:02.436000 audit[1574]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.436000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5bb0e080 a2=0 a3=7fff5bb0e06c items=0 ppid=1553 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:39:02.457000 audit[1579]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.457000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff7fe468b0 a2=0 a3=7fff7fe4689c items=0 ppid=1553 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:39:02.513000 audit[1584]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.513000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdd1082470 a2=0 a3=7ffdd108245c items=0 ppid=1553 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:39:02.519074 kubelet[1553]: I0510 00:39:02.518973 1553 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:39:02.519000 audit[1586]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:02.519000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1c999ad0 a2=0 a3=7ffc1c999abc items=0 ppid=1553 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:39:02.520000 audit[1585]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.520000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecba27a60 a2=0 a3=7ffecba27a4c items=0 ppid=1553 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:39:02.522316 kubelet[1553]: I0510 00:39:02.522273 1553 kubelet_node_status.go:72] "Attempting to register node" node="10.128.0.76" May 10 00:39:02.523577 kubelet[1553]: I0510 00:39:02.523546 1553 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:39:02.523692 kubelet[1553]: I0510 00:39:02.523617 1553 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:39:02.523692 kubelet[1553]: I0510 00:39:02.523643 1553 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:39:02.523816 kubelet[1553]: E0510 00:39:02.523702 1553 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 00:39:02.524000 audit[1588]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.524000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffdf33fbb0 a2=0 a3=7fffdf33fb9c items=0 ppid=1553 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:39:02.527000 audit[1590]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:02.527000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0ffa4bc0 a2=0 a3=7ffd0ffa4bac items=0 ppid=1553 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:39:02.529653 kubelet[1553]: I0510 00:39:02.529628 1553 kubelet_node_status.go:75] "Successfully registered node" node="10.128.0.76" May 10 00:39:02.529000 audit[1589]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:02.529000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd35700620 a2=0 a3=7ffd3570060c items=0 ppid=1553 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:39:02.531000 audit[1591]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:02.531000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffff6b35e00 a2=0 a3=7ffff6b35dec items=0 ppid=1553 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:39:02.533000 audit[1592]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:02.533000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf37cdf70 a2=0 a3=7ffdf37cdf5c items=0 ppid=1553 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:02.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:39:02.639895 sudo[1438]: pam_unix(sudo:session): session closed for user root May 10 00:39:02.638000 audit[1438]: USER_END pid=1438 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:39:02.639000 audit[1438]: CRED_DISP pid=1438 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:39:02.641676 kubelet[1553]: I0510 00:39:02.641623 1553 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 00:39:02.642299 env[1227]: time="2025-05-10T00:39:02.642206328Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:39:02.642739 kubelet[1553]: I0510 00:39:02.642633 1553 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 00:39:02.683363 sshd[1433]: pam_unix(sshd:session): session closed for user core May 10 00:39:02.684000 audit[1433]: USER_END pid=1433 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:39:02.684000 audit[1433]: CRED_DISP pid=1433 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:39:02.687498 systemd[1]: sshd@6-10.128.0.76:22-147.75.109.163:45300.service: Deactivated successfully. May 10 00:39:02.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.76:22-147.75.109.163:45300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:02.688663 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:39:02.689589 systemd-logind[1250]: Session 7 logged out. Waiting for processes to exit. May 10 00:39:02.690925 systemd-logind[1250]: Removed session 7. May 10 00:39:03.222067 kubelet[1553]: I0510 00:39:03.221995 1553 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 00:39:03.222259 kubelet[1553]: W0510 00:39:03.222239 1553 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:39:03.222325 kubelet[1553]: W0510 00:39:03.222290 1553 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:39:03.222447 kubelet[1553]: W0510 00:39:03.222424 1553 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:39:03.322702 kubelet[1553]: E0510 00:39:03.322640 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:03.322702 kubelet[1553]: I0510 00:39:03.322652 1553 apiserver.go:52] "Watching apiserver" May 10 00:39:03.332776 kubelet[1553]: E0510 00:39:03.332482 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:03.339135 systemd[1]: Created slice kubepods-besteffort-pod7df93c36_42de_477d_bdf6_9fef39796cae.slice. May 10 00:39:03.351543 systemd[1]: Created slice kubepods-besteffort-pod24f8afa4_7ab6_4108_8de6_1b4aba761aff.slice. May 10 00:39:03.363587 kubelet[1553]: I0510 00:39:03.363550 1553 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:39:03.369436 kubelet[1553]: I0510 00:39:03.369392 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zj4k6\" (UniqueName: \"kubernetes.io/projected/24f8afa4-7ab6-4108-8de6-1b4aba761aff-kube-api-access-zj4k6\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.369607 kubelet[1553]: I0510 00:39:03.369446 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c31bc9c3-9a95-4e63-8032-dd25ca6165b2-varrun\") pod \"csi-node-driver-tn98d\" (UID: \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\") " pod="calico-system/csi-node-driver-tn98d" May 10 00:39:03.369607 kubelet[1553]: I0510 00:39:03.369475 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c31bc9c3-9a95-4e63-8032-dd25ca6165b2-kubelet-dir\") pod \"csi-node-driver-tn98d\" (UID: \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\") " pod="calico-system/csi-node-driver-tn98d" May 10 00:39:03.369607 kubelet[1553]: I0510 00:39:03.369502 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c31bc9c3-9a95-4e63-8032-dd25ca6165b2-socket-dir\") pod \"csi-node-driver-tn98d\" (UID: \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\") " pod="calico-system/csi-node-driver-tn98d" May 10 00:39:03.369607 kubelet[1553]: I0510 00:39:03.369526 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-lib-modules\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.369607 kubelet[1553]: I0510 00:39:03.369549 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-xtables-lock\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.369949 kubelet[1553]: I0510 00:39:03.369572 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-cni-bin-dir\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.369949 kubelet[1553]: I0510 00:39:03.369600 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-flexvol-driver-host\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.369949 kubelet[1553]: I0510 00:39:03.369627 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c31bc9c3-9a95-4e63-8032-dd25ca6165b2-registration-dir\") pod \"csi-node-driver-tn98d\" (UID: \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\") " pod="calico-system/csi-node-driver-tn98d" May 10 00:39:03.369949 kubelet[1553]: I0510 00:39:03.369654 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8fsq\" (UniqueName: \"kubernetes.io/projected/7df93c36-42de-477d-bdf6-9fef39796cae-kube-api-access-x8fsq\") pod \"kube-proxy-wvq8b\" (UID: \"7df93c36-42de-477d-bdf6-9fef39796cae\") " pod="kube-system/kube-proxy-wvq8b" May 10 00:39:03.369949 kubelet[1553]: I0510 00:39:03.369680 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/24f8afa4-7ab6-4108-8de6-1b4aba761aff-node-certs\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370224 kubelet[1553]: I0510 00:39:03.369708 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7df93c36-42de-477d-bdf6-9fef39796cae-xtables-lock\") pod \"kube-proxy-wvq8b\" (UID: \"7df93c36-42de-477d-bdf6-9fef39796cae\") " pod="kube-system/kube-proxy-wvq8b" May 10 00:39:03.370224 kubelet[1553]: I0510 00:39:03.369732 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-var-run-calico\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370224 kubelet[1553]: I0510 00:39:03.369776 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-var-lib-calico\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370224 kubelet[1553]: I0510 00:39:03.369802 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-cni-net-dir\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370224 kubelet[1553]: I0510 00:39:03.369856 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-cni-log-dir\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370396 kubelet[1553]: I0510 00:39:03.369891 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7df93c36-42de-477d-bdf6-9fef39796cae-kube-proxy\") pod \"kube-proxy-wvq8b\" (UID: \"7df93c36-42de-477d-bdf6-9fef39796cae\") " pod="kube-system/kube-proxy-wvq8b" May 10 00:39:03.370396 kubelet[1553]: I0510 00:39:03.369918 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7df93c36-42de-477d-bdf6-9fef39796cae-lib-modules\") pod \"kube-proxy-wvq8b\" (UID: \"7df93c36-42de-477d-bdf6-9fef39796cae\") " pod="kube-system/kube-proxy-wvq8b" May 10 00:39:03.370396 kubelet[1553]: I0510 00:39:03.369954 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/24f8afa4-7ab6-4108-8de6-1b4aba761aff-policysync\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370396 kubelet[1553]: I0510 00:39:03.369982 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/24f8afa4-7ab6-4108-8de6-1b4aba761aff-tigera-ca-bundle\") pod \"calico-node-wrbsj\" (UID: \"24f8afa4-7ab6-4108-8de6-1b4aba761aff\") " pod="calico-system/calico-node-wrbsj" May 10 00:39:03.370396 kubelet[1553]: I0510 00:39:03.370009 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4srkn\" (UniqueName: \"kubernetes.io/projected/c31bc9c3-9a95-4e63-8032-dd25ca6165b2-kube-api-access-4srkn\") pod \"csi-node-driver-tn98d\" (UID: \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\") " pod="calico-system/csi-node-driver-tn98d" May 10 00:39:03.471466 kubelet[1553]: I0510 00:39:03.471325 1553 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:39:03.477383 kubelet[1553]: E0510 00:39:03.475816 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.477596 kubelet[1553]: W0510 00:39:03.477567 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.477755 kubelet[1553]: E0510 00:39:03.477732 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.478261 kubelet[1553]: E0510 00:39:03.478242 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.478393 kubelet[1553]: W0510 00:39:03.478375 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.478642 kubelet[1553]: E0510 00:39:03.478619 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.478995 kubelet[1553]: E0510 00:39:03.478968 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.479138 kubelet[1553]: W0510 00:39:03.479120 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.479439 kubelet[1553]: E0510 00:39:03.479418 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.479812 kubelet[1553]: E0510 00:39:03.479794 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.479941 kubelet[1553]: W0510 00:39:03.479921 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.480216 kubelet[1553]: E0510 00:39:03.480183 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.480603 kubelet[1553]: E0510 00:39:03.480577 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.480730 kubelet[1553]: W0510 00:39:03.480709 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.480864 kubelet[1553]: E0510 00:39:03.480845 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.481381 kubelet[1553]: E0510 00:39:03.481363 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.481546 kubelet[1553]: W0510 00:39:03.481526 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.481676 kubelet[1553]: E0510 00:39:03.481657 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.485776 kubelet[1553]: E0510 00:39:03.485655 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.485776 kubelet[1553]: W0510 00:39:03.485673 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.485776 kubelet[1553]: E0510 00:39:03.485691 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.506864 kubelet[1553]: E0510 00:39:03.506355 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.506864 kubelet[1553]: W0510 00:39:03.506384 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.506864 kubelet[1553]: E0510 00:39:03.506406 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.506864 kubelet[1553]: E0510 00:39:03.506777 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.506864 kubelet[1553]: W0510 00:39:03.506800 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.506864 kubelet[1553]: E0510 00:39:03.506818 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.515794 kubelet[1553]: E0510 00:39:03.515758 1553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:39:03.515794 kubelet[1553]: W0510 00:39:03.515794 1553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:39:03.515988 kubelet[1553]: E0510 00:39:03.515812 1553 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:39:03.650202 env[1227]: time="2025-05-10T00:39:03.650142141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wvq8b,Uid:7df93c36-42de-477d-bdf6-9fef39796cae,Namespace:kube-system,Attempt:0,}" May 10 00:39:03.657844 env[1227]: time="2025-05-10T00:39:03.657793833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wrbsj,Uid:24f8afa4-7ab6-4108-8de6-1b4aba761aff,Namespace:calico-system,Attempt:0,}" May 10 00:39:04.170395 env[1227]: time="2025-05-10T00:39:04.170321826Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.173450 env[1227]: time="2025-05-10T00:39:04.173393719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.176026 env[1227]: time="2025-05-10T00:39:04.175974794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.177305 env[1227]: time="2025-05-10T00:39:04.177268605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.178531 env[1227]: time="2025-05-10T00:39:04.178496086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.182028 env[1227]: time="2025-05-10T00:39:04.181974193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.184877 env[1227]: time="2025-05-10T00:39:04.184830947Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.186754 env[1227]: time="2025-05-10T00:39:04.186719282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:04.209997 env[1227]: time="2025-05-10T00:39:04.209910199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:39:04.210187 env[1227]: time="2025-05-10T00:39:04.210013612Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:39:04.210187 env[1227]: time="2025-05-10T00:39:04.210079819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:39:04.210319 env[1227]: time="2025-05-10T00:39:04.210281951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c92711e9ba5cebc95485c302392a213ee01ec9d241c99ddb7f3d2d2e44abffc1 pid=1618 runtime=io.containerd.runc.v2 May 10 00:39:04.217504 env[1227]: time="2025-05-10T00:39:04.217016826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:39:04.217504 env[1227]: time="2025-05-10T00:39:04.217116210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:39:04.217504 env[1227]: time="2025-05-10T00:39:04.217137254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:39:04.217760 env[1227]: time="2025-05-10T00:39:04.217570874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965 pid=1631 runtime=io.containerd.runc.v2 May 10 00:39:04.237991 systemd[1]: Started cri-containerd-c92711e9ba5cebc95485c302392a213ee01ec9d241c99ddb7f3d2d2e44abffc1.scope. May 10 00:39:04.246839 systemd[1]: Started cri-containerd-09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965.scope. May 10 00:39:04.283078 kernel: kauditd_printk_skb: 280 callbacks suppressed May 10 00:39:04.283246 kernel: audit: type=1400 audit(1746837544.269:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.344608 kernel: audit: type=1400 audit(1746837544.269:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.344779 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:39:04.344823 kernel: audit: type=1400 audit(1746837544.269:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.344855 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:39:04.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.344977 kubelet[1553]: E0510 00:39:04.344533 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:04.372090 kernel: audit: type=1400 audit(1746837544.269:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.372228 kernel: audit: backlog limit exceeded May 10 00:39:04.372287 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:39:04.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.403227 kernel: audit: type=1400 audit(1746837544.269:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.403383 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:39:04.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.269000 audit: BPF prog-id=61 op=LOAD May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323731316539626135636562633935343835633330323339326132 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323731316539626135636562633935343835633330323339326132 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.288000 audit: BPF prog-id=62 op=LOAD May 10 00:39:04.288000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323731316539626135636562633935343835633330323339326132 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit: BPF prog-id=63 op=LOAD May 10 00:39:04.296000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323731316539626135636562633935343835633330323339326132 May 10 00:39:04.296000 audit: BPF prog-id=63 op=UNLOAD May 10 00:39:04.296000 audit: BPF prog-id=62 op=UNLOAD May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.296000 audit: BPF prog-id=64 op=LOAD May 10 00:39:04.296000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323731316539626135636562633935343835633330323339326132 May 10 00:39:04.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.381000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.381000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003c07e0 items=0 ppid=1631 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643038376164386233646633396566373631306163323932323266 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.409000 audit: BPF prog-id=67 op=LOAD May 10 00:39:04.409000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003c0828 items=0 ppid=1631 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643038376164386233646633396566373631306163323932323266 May 10 00:39:04.410000 audit: BPF prog-id=67 op=UNLOAD May 10 00:39:04.410000 audit: BPF prog-id=66 op=UNLOAD May 10 00:39:04.410000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:04.410000 audit: BPF prog-id=68 op=LOAD May 10 00:39:04.410000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003c0c38 items=0 ppid=1631 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:04.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643038376164386233646633396566373631306163323932323266 May 10 00:39:04.442171 env[1227]: time="2025-05-10T00:39:04.442002540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wrbsj,Uid:24f8afa4-7ab6-4108-8de6-1b4aba761aff,Namespace:calico-system,Attempt:0,} returns sandbox id \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\"" May 10 00:39:04.451412 env[1227]: time="2025-05-10T00:39:04.451368574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:39:04.453428 env[1227]: time="2025-05-10T00:39:04.453383371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wvq8b,Uid:7df93c36-42de-477d-bdf6-9fef39796cae,Namespace:kube-system,Attempt:0,} returns sandbox id \"c92711e9ba5cebc95485c302392a213ee01ec9d241c99ddb7f3d2d2e44abffc1\"" May 10 00:39:04.486390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4182042597.mount: Deactivated successfully. May 10 00:39:04.525893 kubelet[1553]: E0510 00:39:04.525355 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:05.320825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3874561390.mount: Deactivated successfully. May 10 00:39:05.345087 kubelet[1553]: E0510 00:39:05.344957 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:05.478393 env[1227]: time="2025-05-10T00:39:05.478322414Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:05.480932 env[1227]: time="2025-05-10T00:39:05.480872480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:05.483365 env[1227]: time="2025-05-10T00:39:05.483324616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:05.485229 env[1227]: time="2025-05-10T00:39:05.485180072Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:05.485897 env[1227]: time="2025-05-10T00:39:05.485849460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:39:05.488835 env[1227]: time="2025-05-10T00:39:05.488260293Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 00:39:05.489500 env[1227]: time="2025-05-10T00:39:05.489447734Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:39:05.508696 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3364560141.mount: Deactivated successfully. May 10 00:39:05.514346 env[1227]: time="2025-05-10T00:39:05.514276600Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480\"" May 10 00:39:05.516260 env[1227]: time="2025-05-10T00:39:05.516222662Z" level=info msg="StartContainer for \"305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480\"" May 10 00:39:05.557869 systemd[1]: run-containerd-runc-k8s.io-305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480-runc.kbGJB5.mount: Deactivated successfully. May 10 00:39:05.563725 systemd[1]: Started cri-containerd-305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480.scope. May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f53bd50c138 items=0 ppid=1631 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:05.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356139343237313263386666376361633136663639653965633963 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit: BPF prog-id=69 op=LOAD May 10 00:39:05.591000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001830c8 items=0 ppid=1631 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:05.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356139343237313263386666376361633136663639653965633963 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit: BPF prog-id=70 op=LOAD May 10 00:39:05.591000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183118 items=0 ppid=1631 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:05.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356139343237313263386666376361633136663639653965633963 May 10 00:39:05.591000 audit: BPF prog-id=70 op=UNLOAD May 10 00:39:05.591000 audit: BPF prog-id=69 op=UNLOAD May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:05.591000 audit: BPF prog-id=71 op=LOAD May 10 00:39:05.591000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001831a8 items=0 ppid=1631 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:05.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356139343237313263386666376361633136663639653965633963 May 10 00:39:05.611991 env[1227]: time="2025-05-10T00:39:05.611940179Z" level=info msg="StartContainer for \"305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480\" returns successfully" May 10 00:39:05.628700 systemd[1]: cri-containerd-305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480.scope: Deactivated successfully. May 10 00:39:05.631000 audit: BPF prog-id=71 op=UNLOAD May 10 00:39:05.709843 env[1227]: time="2025-05-10T00:39:05.709779305Z" level=info msg="shim disconnected" id=305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480 May 10 00:39:05.709843 env[1227]: time="2025-05-10T00:39:05.709840816Z" level=warning msg="cleaning up after shim disconnected" id=305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480 namespace=k8s.io May 10 00:39:05.710345 env[1227]: time="2025-05-10T00:39:05.709856791Z" level=info msg="cleaning up dead shim" May 10 00:39:05.722024 env[1227]: time="2025-05-10T00:39:05.721961527Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:39:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1741 runtime=io.containerd.runc.v2\n" May 10 00:39:05.900729 env[1227]: time="2025-05-10T00:39:05.898858463Z" level=error msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" failed" error="failed to pull and unpack image \"registry.k8s.io/kube-proxy:v1.31.8\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry.k8s.io/v2/kube-proxy/blobs/sha256:b3e4ec980bf48012c63888eb55acea8523a54df20d8c86e25dec2163b8969b0f: 503 Service Unavailable" May 10 00:39:05.900914 kubelet[1553]: E0510 00:39:05.899237 1553 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"registry.k8s.io/kube-proxy:v1.31.8\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry.k8s.io/v2/kube-proxy/blobs/sha256:b3e4ec980bf48012c63888eb55acea8523a54df20d8c86e25dec2163b8969b0f: 503 Service Unavailable" image="registry.k8s.io/kube-proxy:v1.31.8" May 10 00:39:05.900914 kubelet[1553]: E0510 00:39:05.899504 1553 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"registry.k8s.io/kube-proxy:v1.31.8\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry.k8s.io/v2/kube-proxy/blobs/sha256:b3e4ec980bf48012c63888eb55acea8523a54df20d8c86e25dec2163b8969b0f: 503 Service Unavailable" image="registry.k8s.io/kube-proxy:v1.31.8" May 10 00:39:05.902795 kubelet[1553]: E0510 00:39:05.902673 1553 kuberuntime_manager.go:1272] "Unhandled Error" err="container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.31.8,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-x8fsq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod kube-proxy-wvq8b_kube-system(7df93c36-42de-477d-bdf6-9fef39796cae): ErrImagePull: failed to pull and unpack image \"registry.k8s.io/kube-proxy:v1.31.8\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry.k8s.io/v2/kube-proxy/blobs/sha256:b3e4ec980bf48012c63888eb55acea8523a54df20d8c86e25dec2163b8969b0f: 503 Service Unavailable" logger="UnhandledError" May 10 00:39:05.903929 kubelet[1553]: E0510 00:39:05.903865 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with ErrImagePull: \"failed to pull and unpack image \\\"registry.k8s.io/kube-proxy:v1.31.8\\\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry.k8s.io/v2/kube-proxy/blobs/sha256:b3e4ec980bf48012c63888eb55acea8523a54df20d8c86e25dec2163b8969b0f: 503 Service Unavailable\"" pod="kube-system/kube-proxy-wvq8b" podUID="7df93c36-42de-477d-bdf6-9fef39796cae" May 10 00:39:06.345675 kubelet[1553]: E0510 00:39:06.345521 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:06.503310 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-305a942712c8ff7cac16f69e9ec9cf137fc84a97a8c58bab1644b5c415f96480-rootfs.mount: Deactivated successfully. May 10 00:39:06.525611 kubelet[1553]: E0510 00:39:06.525007 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:06.545915 kubelet[1553]: E0510 00:39:06.545752 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with ImagePullBackOff: \"Back-off pulling image \\\"registry.k8s.io/kube-proxy:v1.31.8\\\"\"" pod="kube-system/kube-proxy-wvq8b" podUID="7df93c36-42de-477d-bdf6-9fef39796cae" May 10 00:39:06.546211 env[1227]: time="2025-05-10T00:39:06.546154471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:39:07.346735 kubelet[1553]: E0510 00:39:07.346685 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:08.347773 kubelet[1553]: E0510 00:39:08.347686 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:08.525359 kubelet[1553]: E0510 00:39:08.524966 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:09.348602 kubelet[1553]: E0510 00:39:09.348484 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:10.349813 kubelet[1553]: E0510 00:39:10.349725 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:10.524795 kubelet[1553]: E0510 00:39:10.524695 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:10.574072 env[1227]: time="2025-05-10T00:39:10.573988622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:10.576758 env[1227]: time="2025-05-10T00:39:10.576695413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:10.578849 env[1227]: time="2025-05-10T00:39:10.578804703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:10.580933 env[1227]: time="2025-05-10T00:39:10.580894025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:10.581708 env[1227]: time="2025-05-10T00:39:10.581664805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:39:10.585385 env[1227]: time="2025-05-10T00:39:10.585337063Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:39:10.606146 env[1227]: time="2025-05-10T00:39:10.605357672Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\"" May 10 00:39:10.606283 env[1227]: time="2025-05-10T00:39:10.606233202Z" level=info msg="StartContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\"" May 10 00:39:10.639428 systemd[1]: run-containerd-runc-k8s.io-a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda-runc.R0HmBh.mount: Deactivated successfully. May 10 00:39:10.647492 systemd[1]: Started cri-containerd-a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda.scope. May 10 00:39:10.698547 kernel: kauditd_printk_skb: 174 callbacks suppressed May 10 00:39:10.698766 kernel: audit: type=1400 audit(1746837550.671:478): avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.700087 kernel: audit: type=1300 audit(1746837550.671:478): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fae001753b8 items=0 ppid=1631 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:10.671000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fae001753b8 items=0 ppid=1631 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:10.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333832623663663636383163633431633938636432393434336264 May 10 00:39:10.759899 kernel: audit: type=1327 audit(1746837550.671:478): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333832623663663636383163633431633938636432393434336264 May 10 00:39:10.760067 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.800834 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.809350 env[1227]: time="2025-05-10T00:39:10.809278978Z" level=info msg="StartContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\" returns successfully" May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.843474 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.843581 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.843642 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.865064 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.905901 kernel: audit: type=1400 audit(1746837550.671:479): avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.671000 audit: BPF prog-id=72 op=LOAD May 10 00:39:10.671000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000228888 items=0 ppid=1631 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:10.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333832623663663636383163633431633938636432393434336264 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit: BPF prog-id=73 op=LOAD May 10 00:39:10.697000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002288d8 items=0 ppid=1631 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:10.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333832623663663636383163633431633938636432393434336264 May 10 00:39:10.697000 audit: BPF prog-id=73 op=UNLOAD May 10 00:39:10.697000 audit: BPF prog-id=72 op=UNLOAD May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { perfmon } for pid=1766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit[1766]: AVC avc: denied { bpf } for pid=1766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:10.697000 audit: BPF prog-id=74 op=LOAD May 10 00:39:10.697000 audit[1766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000228968 items=0 ppid=1631 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:10.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136333832623663663636383163633431633938636432393434336264 May 10 00:39:11.350456 kubelet[1553]: E0510 00:39:11.350381 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:12.350989 kubelet[1553]: E0510 00:39:12.350912 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:12.524699 kubelet[1553]: E0510 00:39:12.524631 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:13.351274 kubelet[1553]: E0510 00:39:13.351221 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:14.351966 kubelet[1553]: E0510 00:39:14.351893 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:14.525336 kubelet[1553]: E0510 00:39:14.524581 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:15.352519 kubelet[1553]: E0510 00:39:15.352473 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:16.353645 kubelet[1553]: E0510 00:39:16.353581 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:16.524361 kubelet[1553]: E0510 00:39:16.524310 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:17.098311 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:39:17.126542 kernel: kauditd_printk_skb: 33 callbacks suppressed May 10 00:39:17.126601 kernel: audit: type=1131 audit(1746837557.097:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:17.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:39:17.140000 audit: BPF prog-id=52 op=UNLOAD May 10 00:39:17.140000 audit: BPF prog-id=51 op=UNLOAD May 10 00:39:17.155490 kernel: audit: type=1334 audit(1746837557.140:485): prog-id=52 op=UNLOAD May 10 00:39:17.155567 kernel: audit: type=1334 audit(1746837557.140:486): prog-id=51 op=UNLOAD May 10 00:39:17.155615 kernel: audit: type=1334 audit(1746837557.140:487): prog-id=50 op=UNLOAD May 10 00:39:17.140000 audit: BPF prog-id=50 op=UNLOAD May 10 00:39:17.353853 kubelet[1553]: E0510 00:39:17.353707 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:18.354307 kubelet[1553]: E0510 00:39:18.354241 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:18.524365 kubelet[1553]: E0510 00:39:18.524310 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:19.354805 kubelet[1553]: E0510 00:39:19.354723 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:20.355146 kubelet[1553]: E0510 00:39:20.355089 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:20.524538 kubelet[1553]: E0510 00:39:20.524126 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:20.526564 env[1227]: time="2025-05-10T00:39:20.526481000Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 00:39:21.355895 kubelet[1553]: E0510 00:39:21.355792 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:21.720036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3909197238.mount: Deactivated successfully. May 10 00:39:22.319527 kubelet[1553]: E0510 00:39:22.319429 1553 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:22.356309 kubelet[1553]: E0510 00:39:22.356221 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:22.524611 kubelet[1553]: E0510 00:39:22.524561 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:22.967827 env[1227]: time="2025-05-10T00:39:22.967763143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:22.972196 env[1227]: time="2025-05-10T00:39:22.972150856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:22.976965 env[1227]: time="2025-05-10T00:39:22.976908376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:22.977768 env[1227]: time="2025-05-10T00:39:22.977726178Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:22.978474 env[1227]: time="2025-05-10T00:39:22.978424016Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 00:39:22.981393 env[1227]: time="2025-05-10T00:39:22.981355679Z" level=info msg="CreateContainer within sandbox \"c92711e9ba5cebc95485c302392a213ee01ec9d241c99ddb7f3d2d2e44abffc1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:39:23.001259 env[1227]: time="2025-05-10T00:39:23.001201703Z" level=info msg="CreateContainer within sandbox \"c92711e9ba5cebc95485c302392a213ee01ec9d241c99ddb7f3d2d2e44abffc1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"964fd69c3f7ed4965a3447f776a7032db10ff19856681f8d4e43025552419bf5\"" May 10 00:39:23.001890 env[1227]: time="2025-05-10T00:39:23.001818756Z" level=info msg="StartContainer for \"964fd69c3f7ed4965a3447f776a7032db10ff19856681f8d4e43025552419bf5\"" May 10 00:39:23.039019 systemd[1]: run-containerd-runc-k8s.io-964fd69c3f7ed4965a3447f776a7032db10ff19856681f8d4e43025552419bf5-runc.Pzp00G.mount: Deactivated successfully. May 10 00:39:23.044594 systemd[1]: Started cri-containerd-964fd69c3f7ed4965a3447f776a7032db10ff19856681f8d4e43025552419bf5.scope. May 10 00:39:23.066000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.121430 kernel: audit: type=1400 audit(1746837563.066:488): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.121618 kernel: audit: type=1300 audit(1746837563.066:488): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fc4940dbc48 items=0 ppid=1618 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.066000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fc4940dbc48 items=0 ppid=1618 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.125077 kernel: audit: type=1327 audit(1746837563.066:488): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346664363963336637656434393635613334343766373736613730 May 10 00:39:23.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346664363963336637656434393635613334343766373736613730 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.170964 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.171092 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.195104 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.232642 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.242237 env[1227]: time="2025-05-10T00:39:23.242189337Z" level=info msg="StartContainer for \"964fd69c3f7ed4965a3447f776a7032db10ff19856681f8d4e43025552419bf5\" returns successfully" May 10 00:39:23.255109 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.277631 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.299058 kernel: audit: type=1400 audit(1746837563.078:489): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.078000 audit: BPF prog-id=75 op=LOAD May 10 00:39:23.078000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00030a888 items=0 ppid=1618 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346664363963336637656434393635613334343766373736613730 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit: BPF prog-id=76 op=LOAD May 10 00:39:23.088000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00030a8d8 items=0 ppid=1618 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346664363963336637656434393635613334343766373736613730 May 10 00:39:23.088000 audit: BPF prog-id=76 op=UNLOAD May 10 00:39:23.088000 audit: BPF prog-id=75 op=UNLOAD May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:23.088000 audit: BPF prog-id=77 op=LOAD May 10 00:39:23.088000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00030a968 items=0 ppid=1618 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346664363963336637656434393635613334343766373736613730 May 10 00:39:23.356948 kubelet[1553]: E0510 00:39:23.356868 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:23.382000 audit[1865]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.382000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc030d8ba0 a2=0 a3=7ffc030d8b8c items=0 ppid=1814 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:39:23.383000 audit[1866]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.383000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc3de2b40 a2=0 a3=7fffc3de2b2c items=0 ppid=1814 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:39:23.385000 audit[1867]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.385000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7ab95c30 a2=0 a3=7fff7ab95c1c items=0 ppid=1814 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:39:23.385000 audit[1868]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.385000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea06d6b20 a2=0 a3=7ffea06d6b0c items=0 ppid=1814 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:39:23.387000 audit[1870]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.387000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb4957720 a2=0 a3=7fffb495770c items=0 ppid=1814 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:39:23.387000 audit[1869]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.387000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd65ae71b0 a2=0 a3=bfadae446bb51759 items=0 ppid=1814 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:39:23.490000 audit[1871]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.490000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee259ae10 a2=0 a3=7ffee259adfc items=0 ppid=1814 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:39:23.494000 audit[1873]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.494000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe48ee2f50 a2=0 a3=7ffe48ee2f3c items=0 ppid=1814 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:39:23.499000 audit[1876]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.499000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffedc87d450 a2=0 a3=7ffedc87d43c items=0 ppid=1814 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:39:23.501000 audit[1877]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.501000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe739169a0 a2=0 a3=7ffe7391698c items=0 ppid=1814 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:39:23.505000 audit[1879]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.505000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffaadd6fe0 a2=0 a3=7fffaadd6fcc items=0 ppid=1814 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:39:23.506000 audit[1880]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.506000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdde7fa2b0 a2=0 a3=7ffdde7fa29c items=0 ppid=1814 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:39:23.511000 audit[1882]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.511000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe77c49ac0 a2=0 a3=7ffe77c49aac items=0 ppid=1814 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:39:23.516000 audit[1885]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.516000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff001aa920 a2=0 a3=7fff001aa90c items=0 ppid=1814 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:39:23.518000 audit[1886]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.518000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5b7e9740 a2=0 a3=7ffc5b7e972c items=0 ppid=1814 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:39:23.522000 audit[1888]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.522000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc993530b0 a2=0 a3=7ffc9935309c items=0 ppid=1814 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:39:23.523000 audit[1889]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.523000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc36853f10 a2=0 a3=7ffc36853efc items=0 ppid=1814 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:39:23.527000 audit[1891]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.527000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeea301410 a2=0 a3=7ffeea3013fc items=0 ppid=1814 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:39:23.533000 audit[1894]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.533000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0b0e2d70 a2=0 a3=7ffe0b0e2d5c items=0 ppid=1814 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:39:23.538000 audit[1897]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.538000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5b4ab690 a2=0 a3=7ffd5b4ab67c items=0 ppid=1814 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:39:23.540000 audit[1898]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.540000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd2ec9c60 a2=0 a3=7ffdd2ec9c4c items=0 ppid=1814 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:39:23.543000 audit[1900]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.543000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffd6605910 a2=0 a3=7fffd66058fc items=0 ppid=1814 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:39:23.572000 audit[1904]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.572000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff2627aca0 a2=0 a3=7fff2627ac8c items=0 ppid=1814 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:39:23.574000 audit[1905]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.574000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff30f9e520 a2=0 a3=7fff30f9e50c items=0 ppid=1814 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:39:23.580000 audit[1907]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:39:23.580000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff42744d50 a2=0 a3=7fff42744d3c items=0 ppid=1814 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:39:23.603000 audit[1913]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:23.603000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd32372c40 a2=0 a3=7ffd32372c2c items=0 ppid=1814 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:23.632000 audit[1913]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:23.632000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7ffd32372c40 a2=0 a3=7ffd32372c2c items=0 ppid=1814 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:23.652000 audit[1922]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.652000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc00716c0 a2=0 a3=7fffc00716ac items=0 ppid=1814 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:39:23.659000 audit[1924]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.659000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe1ae986d0 a2=0 a3=7ffe1ae986bc items=0 ppid=1814 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:39:23.666000 audit[1927]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.666000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff21089f00 a2=0 a3=7fff21089eec items=0 ppid=1814 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:39:23.668000 audit[1928]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.668000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7e927db0 a2=0 a3=7ffd7e927d9c items=0 ppid=1814 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:39:23.671000 audit[1930]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.671000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe28e6bc40 a2=0 a3=7ffe28e6bc2c items=0 ppid=1814 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:39:23.673000 audit[1931]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.673000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf6f6e660 a2=0 a3=7ffcf6f6e64c items=0 ppid=1814 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:39:23.677000 audit[1933]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.677000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3ea6e210 a2=0 a3=7fff3ea6e1fc items=0 ppid=1814 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:39:23.682000 audit[1936]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.682000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd059161d0 a2=0 a3=7ffd059161bc items=0 ppid=1814 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:39:23.684000 audit[1937]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.684000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8aedadb0 a2=0 a3=7ffc8aedad9c items=0 ppid=1814 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:39:23.688000 audit[1939]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.688000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe66114050 a2=0 a3=7ffe6611403c items=0 ppid=1814 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:39:23.689000 audit[1940]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.689000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd47c273f0 a2=0 a3=7ffd47c273dc items=0 ppid=1814 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:39:23.693000 audit[1942]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.693000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb241e820 a2=0 a3=7ffcb241e80c items=0 ppid=1814 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:39:23.698000 audit[1945]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.698000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1437c100 a2=0 a3=7ffd1437c0ec items=0 ppid=1814 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:39:23.703000 audit[1948]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.703000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9cf0fe10 a2=0 a3=7ffe9cf0fdfc items=0 ppid=1814 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:39:23.704000 audit[1949]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.704000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff143ceb90 a2=0 a3=7fff143ceb7c items=0 ppid=1814 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:39:23.709000 audit[1951]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.709000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefd9debb0 a2=0 a3=7ffefd9deb9c items=0 ppid=1814 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:39:23.714000 audit[1954]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.714000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc919cdae0 a2=0 a3=7ffc919cdacc items=0 ppid=1814 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:39:23.716000 audit[1955]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.716000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc04d37540 a2=0 a3=7ffc04d3752c items=0 ppid=1814 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:39:23.719000 audit[1957]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.719000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdccc7b1f0 a2=0 a3=7ffdccc7b1dc items=0 ppid=1814 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:39:23.721000 audit[1958]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.721000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb192a40 a2=0 a3=7ffceb192a2c items=0 ppid=1814 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:39:23.725000 audit[1960]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.725000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf69ac7e0 a2=0 a3=7ffcf69ac7cc items=0 ppid=1814 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:39:23.730000 audit[1963]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:39:23.730000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb6bfce60 a2=0 a3=7ffcb6bfce4c items=0 ppid=1814 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:39:23.735000 audit[1965]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:39:23.735000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffdc1a39f0 a2=0 a3=7fffdc1a39dc items=0 ppid=1814 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.735000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:23.735000 audit[1965]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:39:23.735000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffdc1a39f0 a2=0 a3=7fffdc1a39dc items=0 ppid=1814 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:23.735000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:24.357307 kubelet[1553]: E0510 00:39:24.357258 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:24.525327 kubelet[1553]: E0510 00:39:24.524786 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:25.357471 kubelet[1553]: E0510 00:39:25.357392 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:26.358547 kubelet[1553]: E0510 00:39:26.358474 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:26.525078 kubelet[1553]: E0510 00:39:26.524627 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:27.358695 kubelet[1553]: E0510 00:39:27.358624 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:28.359119 kubelet[1553]: E0510 00:39:28.359051 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:28.524662 kubelet[1553]: E0510 00:39:28.524236 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:29.359943 kubelet[1553]: E0510 00:39:29.359869 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:30.361122 kubelet[1553]: E0510 00:39:30.361031 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:30.525423 kubelet[1553]: E0510 00:39:30.524973 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:31.361282 kubelet[1553]: E0510 00:39:31.361208 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:31.816208 update_engine[1213]: I0510 00:39:31.816146 1213 update_attempter.cc:509] Updating boot flags... May 10 00:39:32.226000 audit[1985]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:32.233777 kernel: kauditd_printk_skb: 186 callbacks suppressed May 10 00:39:32.233893 kernel: audit: type=1325 audit(1746837572.226:545): table=filter:65 family=2 entries=8 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:32.251074 kernel: audit: type=1300 audit(1746837572.226:545): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdd6fbacb0 a2=0 a3=7ffdd6fbac9c items=0 ppid=1814 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:32.226000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdd6fbacb0 a2=0 a3=7ffdd6fbac9c items=0 ppid=1814 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:32.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:32.297995 kernel: audit: type=1327 audit(1746837572.226:545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:32.298120 kernel: audit: type=1325 audit(1746837572.283:546): table=nat:66 family=2 entries=34 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:32.283000 audit[1985]: NETFILTER_CFG table=nat:66 family=2 entries=34 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:39:32.283000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdd6fbacb0 a2=0 a3=7ffdd6fbac9c items=0 ppid=1814 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:32.346934 kernel: audit: type=1300 audit(1746837572.283:546): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdd6fbacb0 a2=0 a3=7ffdd6fbac9c items=0 ppid=1814 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:32.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:32.361627 kubelet[1553]: E0510 00:39:32.361551 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:32.363067 kernel: audit: type=1327 audit(1746837572.283:546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:39:32.524973 kubelet[1553]: E0510 00:39:32.524832 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:33.362605 kubelet[1553]: E0510 00:39:33.362543 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:34.363449 kubelet[1553]: E0510 00:39:34.363404 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:34.524506 kubelet[1553]: E0510 00:39:34.524441 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:35.364186 kubelet[1553]: E0510 00:39:35.364124 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:36.364441 kubelet[1553]: E0510 00:39:36.364388 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:36.525093 kubelet[1553]: E0510 00:39:36.524606 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:37.365212 kubelet[1553]: E0510 00:39:37.365161 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:38.365741 kubelet[1553]: E0510 00:39:38.365695 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:38.524239 kubelet[1553]: E0510 00:39:38.524180 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:39.366348 kubelet[1553]: E0510 00:39:39.366300 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:40.367332 kubelet[1553]: E0510 00:39:40.367282 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:40.524464 kubelet[1553]: E0510 00:39:40.524032 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:41.368520 kubelet[1553]: E0510 00:39:41.368444 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:41.700485 systemd[1]: cri-containerd-a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda.scope: Deactivated successfully. May 10 00:39:41.704000 audit: BPF prog-id=74 op=UNLOAD May 10 00:39:41.713092 kernel: audit: type=1334 audit(1746837581.704:547): prog-id=74 op=UNLOAD May 10 00:39:41.734820 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda-rootfs.mount: Deactivated successfully. May 10 00:39:42.049849 env[1227]: time="2025-05-10T00:39:42.049317579Z" level=info msg="shim disconnected" id=a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda May 10 00:39:42.049849 env[1227]: time="2025-05-10T00:39:42.049390916Z" level=warning msg="cleaning up after shim disconnected" id=a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda namespace=k8s.io May 10 00:39:42.049849 env[1227]: time="2025-05-10T00:39:42.049407591Z" level=info msg="cleaning up dead shim" May 10 00:39:42.061709 env[1227]: time="2025-05-10T00:39:42.061655548Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:39:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1998 runtime=io.containerd.runc.v2\n" May 10 00:39:42.318638 kubelet[1553]: E0510 00:39:42.318508 1553 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:42.369588 kubelet[1553]: E0510 00:39:42.369518 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:42.524703 kubelet[1553]: E0510 00:39:42.524646 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:42.616974 env[1227]: time="2025-05-10T00:39:42.616533347Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for container &ContainerMetadata{Name:install-cni,Attempt:1,}" May 10 00:39:42.634226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3920075337.mount: Deactivated successfully. May 10 00:39:42.636480 kubelet[1553]: I0510 00:39:42.636410 1553 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wvq8b" podStartSLOduration=22.111797212 podStartE2EDuration="40.6363887s" podCreationTimestamp="2025-05-10 00:39:02 +0000 UTC" firstStartedPulling="2025-05-10 00:39:04.455138255 +0000 UTC m=+2.903975823" lastFinishedPulling="2025-05-10 00:39:22.979729738 +0000 UTC m=+21.428567311" observedRunningTime="2025-05-10 00:39:23.595272345 +0000 UTC m=+22.044109939" watchObservedRunningTime="2025-05-10 00:39:42.6363887 +0000 UTC m=+41.085226292" May 10 00:39:42.642260 env[1227]: time="2025-05-10T00:39:42.642177876Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for &ContainerMetadata{Name:install-cni,Attempt:1,} returns container id \"ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf\"" May 10 00:39:42.642774 env[1227]: time="2025-05-10T00:39:42.642726666Z" level=info msg="StartContainer for \"ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf\"" May 10 00:39:42.676253 systemd[1]: Started cri-containerd-ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf.scope. May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.724216 kernel: audit: type=1400 audit(1746837582.702:548): avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fb8a656d718 items=0 ppid=1631 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:42.762034 kernel: audit: type=1300 audit(1746837582.702:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fb8a656d718 items=0 ppid=1631 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:42.762002 systemd[1]: run-containerd-runc-k8s.io-ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf-runc.gF7iJS.mount: Deactivated successfully. May 10 00:39:42.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383662343666313966383831623137666334393864333638383361 May 10 00:39:42.792170 kernel: audit: type=1327 audit(1746837582.702:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383662343666313966383831623137666334393864333638383361 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.814198 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.825170 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.837048 env[1227]: time="2025-05-10T00:39:42.836985064Z" level=info msg="StartContainer for \"ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf\" returns successfully" May 10 00:39:42.702000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.879550 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.879676 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.922107 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.922238 kernel: audit: type=1400 audit(1746837582.702:549): avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.702000 audit: BPF prog-id=78 op=LOAD May 10 00:39:42.702000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028a518 items=0 ppid=1631 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:42.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383662343666313966383831623137666334393864333638383361 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit: BPF prog-id=79 op=LOAD May 10 00:39:42.723000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028a568 items=0 ppid=1631 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:42.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383662343666313966383831623137666334393864333638383361 May 10 00:39:42.723000 audit: BPF prog-id=79 op=UNLOAD May 10 00:39:42.723000 audit: BPF prog-id=78 op=UNLOAD May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:42.723000 audit: BPF prog-id=80 op=LOAD May 10 00:39:42.723000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028a5f8 items=0 ppid=1631 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:42.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383662343666313966383831623137666334393864333638383361 May 10 00:39:43.369889 kubelet[1553]: E0510 00:39:43.369780 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:43.419202 env[1227]: time="2025-05-10T00:39:43.419107813Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:39:43.422997 systemd[1]: cri-containerd-ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf.scope: Deactivated successfully. May 10 00:39:43.425000 audit: BPF prog-id=80 op=UNLOAD May 10 00:39:43.450517 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf-rootfs.mount: Deactivated successfully. May 10 00:39:43.453986 kubelet[1553]: I0510 00:39:43.453954 1553 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 00:39:43.457404 env[1227]: time="2025-05-10T00:39:43.457349119Z" level=info msg="shim disconnected" id=ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf May 10 00:39:43.457569 env[1227]: time="2025-05-10T00:39:43.457407055Z" level=warning msg="cleaning up after shim disconnected" id=ac86b46f19f881b17fc498d36883aaeaa85bd069aef4495b9197b47b306c78bf namespace=k8s.io May 10 00:39:43.457569 env[1227]: time="2025-05-10T00:39:43.457423437Z" level=info msg="cleaning up dead shim" May 10 00:39:43.469119 env[1227]: time="2025-05-10T00:39:43.469075662Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:39:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2060 runtime=io.containerd.runc.v2\n" May 10 00:39:43.619309 kubelet[1553]: I0510 00:39:43.619177 1553 scope.go:117] "RemoveContainer" containerID="a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda" May 10 00:39:43.619559 kubelet[1553]: I0510 00:39:43.619532 1553 scope.go:117] "RemoveContainer" containerID="a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda" May 10 00:39:43.622077 env[1227]: time="2025-05-10T00:39:43.621273297Z" level=info msg="RemoveContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\"" May 10 00:39:43.622638 env[1227]: time="2025-05-10T00:39:43.621897843Z" level=info msg="RemoveContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\"" May 10 00:39:43.622987 env[1227]: time="2025-05-10T00:39:43.622919231Z" level=error msg="RemoveContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\" failed" error="failed to set removing state for container \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\": container is already in removing state" May 10 00:39:43.623455 kubelet[1553]: E0510 00:39:43.623322 1553 log.go:32] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\": container is already in removing state" containerID="a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda" May 10 00:39:43.623455 kubelet[1553]: E0510 00:39:43.623421 1553 kuberuntime_container.go:896] "Unhandled Error" err="failed to remove pod init container \"install-cni\": rpc error: code = Unknown desc = failed to set removing state for container \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\": container is already in removing state; Skipping pod \"calico-node-wrbsj_calico-system(24f8afa4-7ab6-4108-8de6-1b4aba761aff)\"" logger="UnhandledError" May 10 00:39:43.626137 env[1227]: time="2025-05-10T00:39:43.626102307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:39:43.627345 env[1227]: time="2025-05-10T00:39:43.627282351Z" level=info msg="RemoveContainer for \"a6382b6cf6681cc41c98cd29443bd1869d5a328bf2e4f091946e77d7da9aefda\" returns successfully" May 10 00:39:44.370540 kubelet[1553]: E0510 00:39:44.370477 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:44.533486 systemd[1]: Created slice kubepods-besteffort-podc31bc9c3_9a95_4e63_8032_dd25ca6165b2.slice. May 10 00:39:44.538520 env[1227]: time="2025-05-10T00:39:44.538468109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tn98d,Uid:c31bc9c3-9a95-4e63-8032-dd25ca6165b2,Namespace:calico-system,Attempt:0,}" May 10 00:39:44.702894 env[1227]: time="2025-05-10T00:39:44.701237538Z" level=error msg="Failed to destroy network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:44.702894 env[1227]: time="2025-05-10T00:39:44.701704672Z" level=error msg="encountered an error cleaning up failed sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:44.702894 env[1227]: time="2025-05-10T00:39:44.701790100Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tn98d,Uid:c31bc9c3-9a95-4e63-8032-dd25ca6165b2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:44.703265 kubelet[1553]: E0510 00:39:44.702065 1553 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:44.703265 kubelet[1553]: E0510 00:39:44.702160 1553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tn98d" May 10 00:39:44.703265 kubelet[1553]: E0510 00:39:44.702195 1553 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tn98d" May 10 00:39:44.703265 kubelet[1553]: E0510 00:39:44.702255 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tn98d_calico-system(c31bc9c3-9a95-4e63-8032-dd25ca6165b2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tn98d_calico-system(c31bc9c3-9a95-4e63-8032-dd25ca6165b2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:44.704212 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db-shm.mount: Deactivated successfully. May 10 00:39:45.371743 kubelet[1553]: E0510 00:39:45.371670 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:45.627898 kubelet[1553]: I0510 00:39:45.627768 1553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:45.629196 env[1227]: time="2025-05-10T00:39:45.629139553Z" level=info msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" May 10 00:39:45.662668 env[1227]: time="2025-05-10T00:39:45.662588378Z" level=error msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" failed" error="failed to destroy network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:45.662917 kubelet[1553]: E0510 00:39:45.662873 1553 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:45.663024 kubelet[1553]: E0510 00:39:45.662953 1553 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db"} May 10 00:39:45.663116 kubelet[1553]: E0510 00:39:45.663071 1553 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:39:45.663237 kubelet[1553]: E0510 00:39:45.663110 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c31bc9c3-9a95-4e63-8032-dd25ca6165b2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tn98d" podUID="c31bc9c3-9a95-4e63-8032-dd25ca6165b2" May 10 00:39:46.372027 kubelet[1553]: E0510 00:39:46.371953 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:47.373145 kubelet[1553]: E0510 00:39:47.373050 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:48.373824 kubelet[1553]: E0510 00:39:48.373768 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:49.374579 kubelet[1553]: E0510 00:39:49.374508 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:49.801254 systemd[1]: Created slice kubepods-besteffort-pod98f558b9_e1b2_43e1_9477_e627558bdf8a.slice. May 10 00:39:49.925886 kubelet[1553]: I0510 00:39:49.925828 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxctz\" (UniqueName: \"kubernetes.io/projected/98f558b9-e1b2-43e1-9477-e627558bdf8a-kube-api-access-kxctz\") pod \"nginx-deployment-8587fbcb89-jgx6r\" (UID: \"98f558b9-e1b2-43e1-9477-e627558bdf8a\") " pod="default/nginx-deployment-8587fbcb89-jgx6r" May 10 00:39:50.106271 env[1227]: time="2025-05-10T00:39:50.105785773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jgx6r,Uid:98f558b9-e1b2-43e1-9477-e627558bdf8a,Namespace:default,Attempt:0,}" May 10 00:39:50.249945 env[1227]: time="2025-05-10T00:39:50.249874723Z" level=error msg="Failed to destroy network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:50.253337 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293-shm.mount: Deactivated successfully. May 10 00:39:50.255757 env[1227]: time="2025-05-10T00:39:50.255700299Z" level=error msg="encountered an error cleaning up failed sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:50.255971 env[1227]: time="2025-05-10T00:39:50.255929289Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jgx6r,Uid:98f558b9-e1b2-43e1-9477-e627558bdf8a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:50.256879 kubelet[1553]: E0510 00:39:50.256378 1553 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:50.256879 kubelet[1553]: E0510 00:39:50.256454 1553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-jgx6r" May 10 00:39:50.256879 kubelet[1553]: E0510 00:39:50.256487 1553 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-jgx6r" May 10 00:39:50.256879 kubelet[1553]: E0510 00:39:50.256543 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-jgx6r_default(98f558b9-e1b2-43e1-9477-e627558bdf8a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-jgx6r_default(98f558b9-e1b2-43e1-9477-e627558bdf8a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-jgx6r" podUID="98f558b9-e1b2-43e1-9477-e627558bdf8a" May 10 00:39:50.285122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3570114785.mount: Deactivated successfully. May 10 00:39:50.320763 env[1227]: time="2025-05-10T00:39:50.320702998Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:50.322826 env[1227]: time="2025-05-10T00:39:50.322780394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:50.324772 env[1227]: time="2025-05-10T00:39:50.324729365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:50.326945 env[1227]: time="2025-05-10T00:39:50.326904210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:39:50.327708 env[1227]: time="2025-05-10T00:39:50.327666977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:39:50.338764 env[1227]: time="2025-05-10T00:39:50.338722890Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:39:50.353806 env[1227]: time="2025-05-10T00:39:50.353749351Z" level=info msg="CreateContainer within sandbox \"09d087ad8b3df39ef7610ac29222fd431930765fdf1a80cec9eac53661d65965\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff\"" May 10 00:39:50.354285 env[1227]: time="2025-05-10T00:39:50.354249937Z" level=info msg="StartContainer for \"5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff\"" May 10 00:39:50.375674 kubelet[1553]: E0510 00:39:50.375612 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:50.378388 systemd[1]: Started cri-containerd-5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff.scope. May 10 00:39:50.404000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.412058 kernel: kauditd_printk_skb: 35 callbacks suppressed May 10 00:39:50.412346 kernel: audit: type=1400 audit(1746837590.404:555): avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.404000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa881d6fcf8 items=0 ppid=1631 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:50.465079 kernel: audit: type=1300 audit(1746837590.404:555): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa881d6fcf8 items=0 ppid=1631 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:50.493796 kernel: audit: type=1327 audit(1746837590.404:555): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653862363561643339663264636462646566323237613931343266 May 10 00:39:50.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653862363561643339663264636462646566323237613931343266 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.515076 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.539075 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.564063 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.564696 env[1227]: time="2025-05-10T00:39:50.564506655Z" level=info msg="StartContainer for \"5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff\" returns successfully" May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.607396 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.607509 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.607557 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.649148 kernel: audit: type=1400 audit(1746837590.405:556): avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit: BPF prog-id=81 op=LOAD May 10 00:39:50.405000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000096208 items=0 ppid=1631 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:50.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653862363561643339663264636462646566323237613931343266 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit: BPF prog-id=82 op=LOAD May 10 00:39:50.405000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000096258 items=0 ppid=1631 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:50.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653862363561643339663264636462646566323237613931343266 May 10 00:39:50.405000 audit: BPF prog-id=82 op=UNLOAD May 10 00:39:50.405000 audit: BPF prog-id=81 op=UNLOAD May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:50.405000 audit: BPF prog-id=83 op=LOAD May 10 00:39:50.405000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000962e8 items=0 ppid=1631 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:50.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653862363561643339663264636462646566323237613931343266 May 10 00:39:50.660804 kubelet[1553]: I0510 00:39:50.660229 1553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:39:50.661088 env[1227]: time="2025-05-10T00:39:50.660993567Z" level=info msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" May 10 00:39:50.695785 kubelet[1553]: I0510 00:39:50.693940 1553 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wrbsj" podStartSLOduration=2.813739803 podStartE2EDuration="48.693915808s" podCreationTimestamp="2025-05-10 00:39:02 +0000 UTC" firstStartedPulling="2025-05-10 00:39:04.448678754 +0000 UTC m=+2.897516340" lastFinishedPulling="2025-05-10 00:39:50.328854763 +0000 UTC m=+48.777692345" observedRunningTime="2025-05-10 00:39:50.691333653 +0000 UTC m=+49.140171237" watchObservedRunningTime="2025-05-10 00:39:50.693915808 +0000 UTC m=+49.142753400" May 10 00:39:50.729381 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:39:50.729543 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:39:50.739865 env[1227]: time="2025-05-10T00:39:50.739800945Z" level=error msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" failed" error="failed to destroy network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:39:50.740595 kubelet[1553]: E0510 00:39:50.740339 1553 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:39:50.740595 kubelet[1553]: E0510 00:39:50.740425 1553 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293"} May 10 00:39:50.740595 kubelet[1553]: E0510 00:39:50.740494 1553 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"98f558b9-e1b2-43e1-9477-e627558bdf8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:39:50.740595 kubelet[1553]: E0510 00:39:50.740534 1553 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"98f558b9-e1b2-43e1-9477-e627558bdf8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-jgx6r" podUID="98f558b9-e1b2-43e1-9477-e627558bdf8a" May 10 00:39:51.064000 audit[2304]: AVC avc: denied { write } for pid=2304 comm="tee" name="fd" dev="proc" ino=19989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.064000 audit[2304]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0b7f99fd a2=241 a3=1b6 items=1 ppid=2278 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.064000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:39:51.064000 audit: PATH item=0 name="/dev/fd/63" inode=19322 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.084000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=19999 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.084000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffc8c59eb a2=241 a3=1b6 items=1 ppid=2285 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.084000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:39:51.084000 audit: PATH item=0 name="/dev/fd/63" inode=19337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.093000 audit[2308]: AVC avc: denied { write } for pid=2308 comm="tee" name="fd" dev="proc" ino=20003 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.093000 audit[2308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7dd989fc a2=241 a3=1b6 items=1 ppid=2273 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.093000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:39:51.093000 audit: PATH item=0 name="/dev/fd/63" inode=19986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.097000 audit[2313]: AVC avc: denied { write } for pid=2313 comm="tee" name="fd" dev="proc" ino=19346 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.100000 audit[2311]: AVC avc: denied { write } for pid=2311 comm="tee" name="fd" dev="proc" ino=19349 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.100000 audit[2311]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0e5a89fb a2=241 a3=1b6 items=1 ppid=2277 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.100000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:39:51.100000 audit: PATH item=0 name="/dev/fd/63" inode=19333 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.101000 audit[2316]: AVC avc: denied { write } for pid=2316 comm="tee" name="fd" dev="proc" ino=19353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.097000 audit[2313]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25da49fb a2=241 a3=1b6 items=1 ppid=2279 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.097000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:39:51.097000 audit: PATH item=0 name="/dev/fd/63" inode=19334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.101000 audit[2316]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7f5739ec a2=241 a3=1b6 items=1 ppid=2275 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.101000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:39:51.101000 audit: PATH item=0 name="/dev/fd/63" inode=19994 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.101000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.109000 audit[2329]: AVC avc: denied { write } for pid=2329 comm="tee" name="fd" dev="proc" ino=19360 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:39:51.109000 audit[2329]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc87cd9fb a2=241 a3=1b6 items=1 ppid=2282 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.109000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:39:51.109000 audit: PATH item=0 name="/dev/fd/63" inode=19342 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:39:51.109000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit: BPF prog-id=84 op=LOAD May 10 00:39:51.364000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff329e5360 a2=98 a3=3 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.364000 audit: BPF prog-id=84 op=UNLOAD May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.364000 audit: BPF prog-id=85 op=LOAD May 10 00:39:51.364000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff329e5140 a2=74 a3=540051 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.365000 audit: BPF prog-id=85 op=UNLOAD May 10 00:39:51.365000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.365000 audit: BPF prog-id=86 op=LOAD May 10 00:39:51.365000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff329e5170 a2=94 a3=2 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.365000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.365000 audit: BPF prog-id=86 op=UNLOAD May 10 00:39:51.376637 kubelet[1553]: E0510 00:39:51.376551 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:51.487000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit: BPF prog-id=87 op=LOAD May 10 00:39:51.487000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff329e5030 a2=40 a3=1 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.487000 audit: BPF prog-id=87 op=UNLOAD May 10 00:39:51.487000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.487000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff329e5100 a2=50 a3=7fff329e51e0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e5040 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff329e5070 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff329e4f80 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e5090 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e5070 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e5060 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e5090 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff329e5070 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff329e5090 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff329e5060 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.499000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.499000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff329e50d0 a2=28 a3=0 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff329e4e80 a2=50 a3=1 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit: BPF prog-id=88 op=LOAD May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff329e4e80 a2=94 a3=5 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit: BPF prog-id=88 op=UNLOAD May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff329e4f30 a2=50 a3=1 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff329e5050 a2=4 a3=38 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { confidentiality } for pid=2384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff329e50a0 a2=94 a3=6 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.500000 audit[2384]: AVC avc: denied { confidentiality } for pid=2384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.500000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff329e4850 a2=94 a3=83 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.501000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.501000 audit[2384]: AVC avc: denied { confidentiality } for pid=2384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.501000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff329e4850 a2=94 a3=83 items=0 ppid=2283 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit: BPF prog-id=89 op=LOAD May 10 00:39:51.514000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe214e5e50 a2=98 a3=1999999999999999 items=0 ppid=2283 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:39:51.514000 audit: BPF prog-id=89 op=UNLOAD May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit: BPF prog-id=90 op=LOAD May 10 00:39:51.514000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe214e5d30 a2=74 a3=ffff items=0 ppid=2283 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:39:51.514000 audit: BPF prog-id=90 op=UNLOAD May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.514000 audit: BPF prog-id=91 op=LOAD May 10 00:39:51.514000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe214e5d70 a2=40 a3=7ffe214e5f50 items=0 ppid=2283 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:39:51.515000 audit: BPF prog-id=91 op=UNLOAD May 10 00:39:51.599286 systemd-networkd[1029]: vxlan.calico: Link UP May 10 00:39:51.599299 systemd-networkd[1029]: vxlan.calico: Gained carrier May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit: BPF prog-id=92 op=LOAD May 10 00:39:51.635000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd877a3910 a2=98 a3=ffffffff items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.635000 audit: BPF prog-id=92 op=UNLOAD May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit: BPF prog-id=93 op=LOAD May 10 00:39:51.635000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd877a3720 a2=74 a3=540051 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.635000 audit: BPF prog-id=93 op=UNLOAD May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit: BPF prog-id=94 op=LOAD May 10 00:39:51.635000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd877a3750 a2=94 a3=2 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.635000 audit: BPF prog-id=94 op=UNLOAD May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a3620 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.635000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.635000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd877a3650 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd877a3560 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a3670 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a3650 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a3640 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a3670 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd877a3650 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd877a3670 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd877a3640 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd877a36b0 a2=28 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.636000 audit: BPF prog-id=95 op=LOAD May 10 00:39:51.636000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd877a3520 a2=40 a3=0 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.636000 audit: BPF prog-id=95 op=UNLOAD May 10 00:39:51.637000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.637000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd877a3510 a2=50 a3=2800 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.637000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.637000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd877a3510 a2=50 a3=2800 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit: BPF prog-id=96 op=LOAD May 10 00:39:51.638000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd877a2d30 a2=94 a3=2 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.638000 audit: BPF prog-id=96 op=UNLOAD May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.638000 audit: BPF prog-id=97 op=LOAD May 10 00:39:51.638000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd877a2e30 a2=94 a3=30 items=0 ppid=2283 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.645000 audit: BPF prog-id=98 op=LOAD May 10 00:39:51.645000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8dc6d0f0 a2=98 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.645000 audit: BPF prog-id=98 op=UNLOAD May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit: BPF prog-id=99 op=LOAD May 10 00:39:51.646000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8dc6ced0 a2=74 a3=540051 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.646000 audit: BPF prog-id=99 op=UNLOAD May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.646000 audit: BPF prog-id=100 op=LOAD May 10 00:39:51.646000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8dc6cf00 a2=94 a3=2 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.646000 audit: BPF prog-id=100 op=UNLOAD May 10 00:39:51.725933 systemd[1]: run-containerd-runc-k8s.io-5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff-runc.11bVxf.mount: Deactivated successfully. May 10 00:39:51.850000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.850000 audit: BPF prog-id=101 op=LOAD May 10 00:39:51.850000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8dc6cdc0 a2=40 a3=1 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.851000 audit: BPF prog-id=101 op=UNLOAD May 10 00:39:51.851000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.851000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe8dc6ce90 a2=50 a3=7ffe8dc6cf70 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.851000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6cdd0 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8dc6ce00 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8dc6cd10 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6ce20 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6ce00 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6cdf0 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6ce20 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8dc6ce00 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8dc6ce20 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8dc6cdf0 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8dc6ce60 a2=28 a3=0 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe8dc6cc10 a2=50 a3=1 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit: BPF prog-id=102 op=LOAD May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe8dc6cc10 a2=94 a3=5 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit: BPF prog-id=102 op=UNLOAD May 10 00:39:51.863000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe8dc6ccc0 a2=50 a3=1 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.863000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.863000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe8dc6cde0 a2=4 a3=38 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.864000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8dc6ce30 a2=94 a3=6 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.864000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8dc6c5e0 a2=94 a3=83 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.864000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:39:51.864000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8dc6c5e0 a2=94 a3=83 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.865000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.865000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8dc6e020 a2=10 a3=f1f00800 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.865000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.865000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.865000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8dc6dec0 a2=10 a3=3 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.865000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.865000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.865000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8dc6de60 a2=10 a3=3 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.865000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.865000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:51.865000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8dc6de60 a2=10 a3=7 items=0 ppid=2283 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.865000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:39:51.876000 audit: BPF prog-id=97 op=UNLOAD May 10 00:39:51.946000 audit[2461]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:39:51.946000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc07bb8a90 a2=0 a3=7ffc07bb8a7c items=0 ppid=2283 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.946000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:39:51.974000 audit[2462]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:39:51.974000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc75124f90 a2=0 a3=7ffc75124f7c items=0 ppid=2283 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:39:51.978000 audit[2463]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:39:51.978000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd946fcba0 a2=0 a3=7ffd946fcb8c items=0 ppid=2283 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.978000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:39:51.980000 audit[2464]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:39:51.980000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd06bbbe70 a2=0 a3=7ffd06bbbe5c items=0 ppid=2283 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:51.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:39:52.377202 kubelet[1553]: E0510 00:39:52.377133 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:52.744857 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL May 10 00:39:53.378100 kubelet[1553]: E0510 00:39:53.378016 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:54.378907 kubelet[1553]: E0510 00:39:54.378842 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:55.379239 kubelet[1553]: E0510 00:39:55.379177 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:56.380387 kubelet[1553]: E0510 00:39:56.380297 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:57.381279 kubelet[1553]: E0510 00:39:57.381210 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:58.382140 kubelet[1553]: E0510 00:39:58.382068 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:59.383170 kubelet[1553]: E0510 00:39:59.383100 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:39:59.525025 env[1227]: time="2025-05-10T00:39:59.524885914Z" level=info msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.584 [INFO][2500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.585 [INFO][2500] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" iface="eth0" netns="/var/run/netns/cni-a202c2db-fd6a-348b-d352-a7dc6e9a4fd2" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.585 [INFO][2500] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" iface="eth0" netns="/var/run/netns/cni-a202c2db-fd6a-348b-d352-a7dc6e9a4fd2" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.585 [INFO][2500] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" iface="eth0" netns="/var/run/netns/cni-a202c2db-fd6a-348b-d352-a7dc6e9a4fd2" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.585 [INFO][2500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.585 [INFO][2500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.610 [INFO][2507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.610 [INFO][2507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.610 [INFO][2507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.621 [WARNING][2507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.622 [INFO][2507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.623 [INFO][2507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:39:59.626185 env[1227]: 2025-05-10 00:39:59.624 [INFO][2500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:39:59.629408 systemd[1]: run-netns-cni\x2da202c2db\x2dfd6a\x2d348b\x2dd352\x2da7dc6e9a4fd2.mount: Deactivated successfully. May 10 00:39:59.631287 env[1227]: time="2025-05-10T00:39:59.630512036Z" level=info msg="TearDown network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" successfully" May 10 00:39:59.631287 env[1227]: time="2025-05-10T00:39:59.630559477Z" level=info msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" returns successfully" May 10 00:39:59.631832 env[1227]: time="2025-05-10T00:39:59.631791152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tn98d,Uid:c31bc9c3-9a95-4e63-8032-dd25ca6165b2,Namespace:calico-system,Attempt:1,}" May 10 00:39:59.783529 systemd-networkd[1029]: cali07d2b4c1ae7: Link UP May 10 00:39:59.793155 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:39:59.802624 systemd-networkd[1029]: cali07d2b4c1ae7: Gained carrier May 10 00:39:59.803075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali07d2b4c1ae7: link becomes ready May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.693 [INFO][2513] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.76-k8s-csi--node--driver--tn98d-eth0 csi-node-driver- calico-system c31bc9c3-9a95-4e63-8032-dd25ca6165b2 1152 0 2025-05-10 00:39:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.76 csi-node-driver-tn98d eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali07d2b4c1ae7 [] []}} ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.693 [INFO][2513] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.732 [INFO][2527] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" HandleID="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.748 [INFO][2527] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" HandleID="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.76", "pod":"csi-node-driver-tn98d", "timestamp":"2025-05-10 00:39:59.732800604 +0000 UTC"}, Hostname:"10.128.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.748 [INFO][2527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.748 [INFO][2527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.748 [INFO][2527] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.76' May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.750 [INFO][2527] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.754 [INFO][2527] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.758 [INFO][2527] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.761 [INFO][2527] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.763 [INFO][2527] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.763 [INFO][2527] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.765 [INFO][2527] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.770 [INFO][2527] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.777 [INFO][2527] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.65/26] block=192.168.26.64/26 handle="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.777 [INFO][2527] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.65/26] handle="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" host="10.128.0.76" May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.777 [INFO][2527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:39:59.829326 env[1227]: 2025-05-10 00:39:59.777 [INFO][2527] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.65/26] IPv6=[] ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" HandleID="k8s-pod-network.b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.779 [INFO][2513] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-csi--node--driver--tn98d-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c31bc9c3-9a95-4e63-8032-dd25ca6165b2", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"", Pod:"csi-node-driver-tn98d", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali07d2b4c1ae7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.779 [INFO][2513] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.65/32] ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.779 [INFO][2513] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali07d2b4c1ae7 ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.803 [INFO][2513] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.803 [INFO][2513] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-csi--node--driver--tn98d-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c31bc9c3-9a95-4e63-8032-dd25ca6165b2", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b", Pod:"csi-node-driver-tn98d", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali07d2b4c1ae7", MAC:"d2:85:b2:c3:75:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:39:59.830986 env[1227]: 2025-05-10 00:39:59.828 [INFO][2513] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b" Namespace="calico-system" Pod="csi-node-driver-tn98d" WorkloadEndpoint="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:39:59.846807 env[1227]: time="2025-05-10T00:39:59.846715989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:39:59.846807 env[1227]: time="2025-05-10T00:39:59.846767024Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:39:59.847066 env[1227]: time="2025-05-10T00:39:59.846786613Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:39:59.847259 env[1227]: time="2025-05-10T00:39:59.847156551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b pid=2554 runtime=io.containerd.runc.v2 May 10 00:39:59.873804 systemd[1]: Started cri-containerd-b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b.scope. May 10 00:39:59.924432 kernel: kauditd_printk_skb: 548 callbacks suppressed May 10 00:39:59.924581 kernel: audit: type=1400 audit(1746837599.895:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.949448 env[1227]: time="2025-05-10T00:39:59.945292299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tn98d,Uid:c31bc9c3-9a95-4e63-8032-dd25ca6165b2,Namespace:calico-system,Attempt:1,} returns sandbox id \"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b\"" May 10 00:39:59.949448 env[1227]: time="2025-05-10T00:39:59.947273801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:39:59.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.975456 kernel: audit: type=1400 audit(1746837599.895:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.975555 kernel: audit: type=1400 audit(1746837599.895:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.975606 kernel: audit: type=1400 audit(1746837599.895:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.997076 kernel: audit: type=1400 audit(1746837599.895:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:00.038141 kernel: audit: type=1400 audit(1746837599.895:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:00.038199 kernel: audit: type=1400 audit(1746837599.895:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:00.079449 kernel: audit: type=1400 audit(1746837599.895:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:00.079532 kernel: audit: type=1400 audit(1746837599.895:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:00.099880 kernel: audit: type=1400 audit(1746837599.921:672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.921000 audit: BPF prog-id=103 op=LOAD May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2554 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234613264626165663563326532613965363934396563623330333864 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2554 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234613264626165663563326532613965363934396563623330333864 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit: BPF prog-id=104 op=LOAD May 10 00:39:59.924000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d96a0 items=0 ppid=2554 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234613264626165663563326532613965363934396563623330333864 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.924000 audit: BPF prog-id=105 op=LOAD May 10 00:39:59.924000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d96e8 items=0 ppid=2554 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234613264626165663563326532613965363934396563623330333864 May 10 00:39:59.924000 audit: BPF prog-id=105 op=UNLOAD May 10 00:39:59.924000 audit: BPF prog-id=104 op=UNLOAD May 10 00:39:59.925000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:39:59.925000 audit: BPF prog-id=106 op=LOAD May 10 00:39:59.925000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9af8 items=0 ppid=2554 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234613264626165663563326532613965363934396563623330333864 May 10 00:39:59.953000 audit[2590]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=2590 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:39:59.953000 audit[2590]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe60401b10 a2=0 a3=7ffe60401afc items=0 ppid=2283 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:39:59.953000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:40:00.383752 kubelet[1553]: E0510 00:40:00.383698 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:01.076292 env[1227]: time="2025-05-10T00:40:01.076222700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:01.078579 env[1227]: time="2025-05-10T00:40:01.078532161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:01.080590 env[1227]: time="2025-05-10T00:40:01.080553442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:01.082432 env[1227]: time="2025-05-10T00:40:01.082395600Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:01.083096 env[1227]: time="2025-05-10T00:40:01.083034230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:40:01.085871 env[1227]: time="2025-05-10T00:40:01.085824329Z" level=info msg="CreateContainer within sandbox \"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:40:01.104293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2725994909.mount: Deactivated successfully. May 10 00:40:01.109694 env[1227]: time="2025-05-10T00:40:01.109643088Z" level=info msg="CreateContainer within sandbox \"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"403bb651194df0208ccc4355fcdf9d2324a4c2186f68fd162c8182363ebd22a7\"" May 10 00:40:01.110313 env[1227]: time="2025-05-10T00:40:01.110273958Z" level=info msg="StartContainer for \"403bb651194df0208ccc4355fcdf9d2324a4c2186f68fd162c8182363ebd22a7\"" May 10 00:40:01.145563 systemd[1]: Started cri-containerd-403bb651194df0208ccc4355fcdf9d2324a4c2186f68fd162c8182363ebd22a7.scope. May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0c08b7e2f8 items=0 ppid=2554 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:01.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336262363531313934646630323038636363343335356663646639 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit: BPF prog-id=107 op=LOAD May 10 00:40:01.165000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024238 items=0 ppid=2554 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:01.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336262363531313934646630323038636363343335356663646639 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit: BPF prog-id=108 op=LOAD May 10 00:40:01.165000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024288 items=0 ppid=2554 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:01.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336262363531313934646630323038636363343335356663646639 May 10 00:40:01.165000 audit: BPF prog-id=108 op=UNLOAD May 10 00:40:01.165000 audit: BPF prog-id=107 op=UNLOAD May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:01.165000 audit: BPF prog-id=109 op=LOAD May 10 00:40:01.165000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024318 items=0 ppid=2554 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:01.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336262363531313934646630323038636363343335356663646639 May 10 00:40:01.187178 env[1227]: time="2025-05-10T00:40:01.187122769Z" level=info msg="StartContainer for \"403bb651194df0208ccc4355fcdf9d2324a4c2186f68fd162c8182363ebd22a7\" returns successfully" May 10 00:40:01.190073 env[1227]: time="2025-05-10T00:40:01.188894660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:40:01.384635 kubelet[1553]: E0510 00:40:01.384565 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:01.512449 systemd-networkd[1029]: cali07d2b4c1ae7: Gained IPv6LL May 10 00:40:01.525267 env[1227]: time="2025-05-10T00:40:01.525199078Z" level=info msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.696 [INFO][2640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.697 [INFO][2640] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" iface="eth0" netns="/var/run/netns/cni-494396f4-56f3-b20e-e3a1-bb1354762390" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.697 [INFO][2640] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" iface="eth0" netns="/var/run/netns/cni-494396f4-56f3-b20e-e3a1-bb1354762390" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.697 [INFO][2640] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" iface="eth0" netns="/var/run/netns/cni-494396f4-56f3-b20e-e3a1-bb1354762390" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.698 [INFO][2640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.698 [INFO][2640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.724 [INFO][2647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.725 [INFO][2647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.725 [INFO][2647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.742 [WARNING][2647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.742 [INFO][2647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.743 [INFO][2647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:01.746282 env[1227]: 2025-05-10 00:40:01.745 [INFO][2640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:01.747735 env[1227]: time="2025-05-10T00:40:01.747683039Z" level=info msg="TearDown network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" successfully" May 10 00:40:01.747911 env[1227]: time="2025-05-10T00:40:01.747881127Z" level=info msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" returns successfully" May 10 00:40:01.749503 env[1227]: time="2025-05-10T00:40:01.749381550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jgx6r,Uid:98f558b9-e1b2-43e1-9477-e627558bdf8a,Namespace:default,Attempt:1,}" May 10 00:40:01.749579 systemd[1]: run-netns-cni\x2d494396f4\x2d56f3\x2db20e\x2de3a1\x2dbb1354762390.mount: Deactivated successfully. May 10 00:40:01.948517 systemd-networkd[1029]: cali55c89d29252: Link UP May 10 00:40:01.959160 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:40:01.959281 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali55c89d29252: link becomes ready May 10 00:40:01.964976 systemd-networkd[1029]: cali55c89d29252: Gained carrier May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.806 [INFO][2653] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0 nginx-deployment-8587fbcb89- default 98f558b9-e1b2-43e1-9477-e627558bdf8a 1161 0 2025-05-10 00:39:49 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.76 nginx-deployment-8587fbcb89-jgx6r eth0 default [] [] [kns.default ksa.default.default] cali55c89d29252 [] []}} ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.806 [INFO][2653] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.843 [INFO][2667] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" HandleID="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.854 [INFO][2667] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" HandleID="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002edbe0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.76", "pod":"nginx-deployment-8587fbcb89-jgx6r", "timestamp":"2025-05-10 00:40:01.84334011 +0000 UTC"}, Hostname:"10.128.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.854 [INFO][2667] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.854 [INFO][2667] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.854 [INFO][2667] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.76' May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.857 [INFO][2667] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.861 [INFO][2667] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.865 [INFO][2667] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.867 [INFO][2667] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.871 [INFO][2667] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.872 [INFO][2667] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.874 [INFO][2667] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.934 [INFO][2667] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.941 [INFO][2667] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.66/26] block=192.168.26.64/26 handle="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.941 [INFO][2667] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.66/26] handle="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" host="10.128.0.76" May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.941 [INFO][2667] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:01.985905 env[1227]: 2025-05-10 00:40:01.941 [INFO][2667] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.66/26] IPv6=[] ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" HandleID="k8s-pod-network.0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.943 [INFO][2653] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"98f558b9-e1b2-43e1-9477-e627558bdf8a", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-jgx6r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali55c89d29252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.943 [INFO][2653] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.66/32] ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.943 [INFO][2653] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali55c89d29252 ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.970 [INFO][2653] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.975 [INFO][2653] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"98f558b9-e1b2-43e1-9477-e627558bdf8a", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af", Pod:"nginx-deployment-8587fbcb89-jgx6r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali55c89d29252", MAC:"f2:b1:10:64:a4:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:01.991871 env[1227]: 2025-05-10 00:40:01.984 [INFO][2653] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af" Namespace="default" Pod="nginx-deployment-8587fbcb89-jgx6r" WorkloadEndpoint="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.035155 env[1227]: time="2025-05-10T00:40:02.034702207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:40:02.035155 env[1227]: time="2025-05-10T00:40:02.034772765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:40:02.035155 env[1227]: time="2025-05-10T00:40:02.034793910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:40:02.035826 env[1227]: time="2025-05-10T00:40:02.035759622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af pid=2699 runtime=io.containerd.runc.v2 May 10 00:40:02.040000 audit[2706]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:40:02.040000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe67fcce30 a2=0 a3=7ffe67fcce1c items=0 ppid=2283 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:40:02.062833 systemd[1]: Started cri-containerd-0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af.scope. May 10 00:40:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.093000 audit: BPF prog-id=110 op=LOAD May 10 00:40:02.094000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.094000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2699 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303365373933643733303039663066363365353264636232386536 May 10 00:40:02.102000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.102000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2699 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303365373933643733303039663066363365353264636232386536 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.103000 audit: BPF prog-id=111 op=LOAD May 10 00:40:02.103000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001d90d0 items=0 ppid=2699 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303365373933643733303039663066363365353264636232386536 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.104000 audit: BPF prog-id=112 op=LOAD May 10 00:40:02.104000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001d9118 items=0 ppid=2699 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303365373933643733303039663066363365353264636232386536 May 10 00:40:02.105000 audit: BPF prog-id=112 op=UNLOAD May 10 00:40:02.105000 audit: BPF prog-id=111 op=UNLOAD May 10 00:40:02.109000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.109000 audit: BPF prog-id=113 op=LOAD May 10 00:40:02.109000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001d9528 items=0 ppid=2699 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303365373933643733303039663066363365353264636232386536 May 10 00:40:02.160654 env[1227]: time="2025-05-10T00:40:02.160595908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jgx6r,Uid:98f558b9-e1b2-43e1-9477-e627558bdf8a,Namespace:default,Attempt:1,} returns sandbox id \"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af\"" May 10 00:40:02.319337 kubelet[1553]: E0510 00:40:02.319156 1553 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:02.362239 env[1227]: time="2025-05-10T00:40:02.362187577Z" level=info msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" May 10 00:40:02.384764 kubelet[1553]: E0510 00:40:02.384724 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.473 [WARNING][2749] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-csi--node--driver--tn98d-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c31bc9c3-9a95-4e63-8032-dd25ca6165b2", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b", Pod:"csi-node-driver-tn98d", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali07d2b4c1ae7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.473 [INFO][2749] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.473 [INFO][2749] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" iface="eth0" netns="" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.473 [INFO][2749] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.474 [INFO][2749] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.533 [INFO][2756] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.533 [INFO][2756] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.533 [INFO][2756] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.545 [WARNING][2756] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.545 [INFO][2756] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.547 [INFO][2756] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:02.550812 env[1227]: 2025-05-10 00:40:02.549 [INFO][2749] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.551841 env[1227]: time="2025-05-10T00:40:02.551784088Z" level=info msg="TearDown network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" successfully" May 10 00:40:02.551967 env[1227]: time="2025-05-10T00:40:02.551940937Z" level=info msg="StopPodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" returns successfully" May 10 00:40:02.552703 env[1227]: time="2025-05-10T00:40:02.552669763Z" level=info msg="RemovePodSandbox for \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" May 10 00:40:02.552907 env[1227]: time="2025-05-10T00:40:02.552854222Z" level=info msg="Forcibly stopping sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\"" May 10 00:40:02.624944 env[1227]: time="2025-05-10T00:40:02.624890322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:02.627604 env[1227]: time="2025-05-10T00:40:02.627565539Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:02.629607 env[1227]: time="2025-05-10T00:40:02.629572482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:02.632786 env[1227]: time="2025-05-10T00:40:02.632743090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:02.635259 env[1227]: time="2025-05-10T00:40:02.635215564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:40:02.637447 env[1227]: time="2025-05-10T00:40:02.637412961Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:40:02.638476 env[1227]: time="2025-05-10T00:40:02.638442300Z" level=info msg="CreateContainer within sandbox \"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:40:02.664364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2247399755.mount: Deactivated successfully. May 10 00:40:02.678524 env[1227]: time="2025-05-10T00:40:02.678468813Z" level=info msg="CreateContainer within sandbox \"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"59bcfdcd386b0c41b602160719dcf78ca6f3095819bdd5179ac2bce18d761a79\"" May 10 00:40:02.679167 env[1227]: time="2025-05-10T00:40:02.679113123Z" level=info msg="StartContainer for \"59bcfdcd386b0c41b602160719dcf78ca6f3095819bdd5179ac2bce18d761a79\"" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.633 [WARNING][2779] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-csi--node--driver--tn98d-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c31bc9c3-9a95-4e63-8032-dd25ca6165b2", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"b4a2dbaef5c2e2a9e6949ecb3038da6232b9dbfbba8086b9fe5c42f3c043251b", Pod:"csi-node-driver-tn98d", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali07d2b4c1ae7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.634 [INFO][2779] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.634 [INFO][2779] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" iface="eth0" netns="" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.634 [INFO][2779] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.634 [INFO][2779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.688 [INFO][2786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.690 [INFO][2786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.690 [INFO][2786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.708 [WARNING][2786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.708 [INFO][2786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" HandleID="k8s-pod-network.7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" Workload="10.128.0.76-k8s-csi--node--driver--tn98d-eth0" May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.712 [INFO][2786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:02.714797 env[1227]: 2025-05-10 00:40:02.713 [INFO][2779] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db" May 10 00:40:02.715684 env[1227]: time="2025-05-10T00:40:02.714892136Z" level=info msg="TearDown network for sandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" successfully" May 10 00:40:02.718416 env[1227]: time="2025-05-10T00:40:02.718370281Z" level=info msg="RemovePodSandbox \"7b47e58ad920812b8687791f1282ee53fceb1ed227b500f2e66dd3d3f06f92db\" returns successfully" May 10 00:40:02.719273 env[1227]: time="2025-05-10T00:40:02.719235136Z" level=info msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" May 10 00:40:02.737376 systemd[1]: Started cri-containerd-59bcfdcd386b0c41b602160719dcf78ca6f3095819bdd5179ac2bce18d761a79.scope. May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9bf060c918 items=0 ppid=2554 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626366646364333836623063343162363032313630373139646366 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit: BPF prog-id=114 op=LOAD May 10 00:40:02.764000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e2308 items=0 ppid=2554 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626366646364333836623063343162363032313630373139646366 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit: BPF prog-id=115 op=LOAD May 10 00:40:02.764000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e2358 items=0 ppid=2554 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626366646364333836623063343162363032313630373139646366 May 10 00:40:02.764000 audit: BPF prog-id=115 op=UNLOAD May 10 00:40:02.764000 audit: BPF prog-id=114 op=UNLOAD May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:02.764000 audit: BPF prog-id=116 op=LOAD May 10 00:40:02.764000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e23e8 items=0 ppid=2554 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626366646364333836623063343162363032313630373139646366 May 10 00:40:02.814527 env[1227]: time="2025-05-10T00:40:02.814474062Z" level=info msg="StartContainer for \"59bcfdcd386b0c41b602160719dcf78ca6f3095819bdd5179ac2bce18d761a79\" returns successfully" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.829 [WARNING][2832] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"98f558b9-e1b2-43e1-9477-e627558bdf8a", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af", Pod:"nginx-deployment-8587fbcb89-jgx6r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali55c89d29252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.830 [INFO][2832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.830 [INFO][2832] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" iface="eth0" netns="" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.830 [INFO][2832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.830 [INFO][2832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.860 [INFO][2853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.861 [INFO][2853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.861 [INFO][2853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.868 [WARNING][2853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.868 [INFO][2853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.870 [INFO][2853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:02.872786 env[1227]: 2025-05-10 00:40:02.871 [INFO][2832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.873798 env[1227]: time="2025-05-10T00:40:02.873731195Z" level=info msg="TearDown network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" successfully" May 10 00:40:02.873798 env[1227]: time="2025-05-10T00:40:02.873778544Z" level=info msg="StopPodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" returns successfully" May 10 00:40:02.874459 env[1227]: time="2025-05-10T00:40:02.874403203Z" level=info msg="RemovePodSandbox for \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" May 10 00:40:02.874571 env[1227]: time="2025-05-10T00:40:02.874450147Z" level=info msg="Forcibly stopping sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\"" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.917 [WARNING][2872] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"98f558b9-e1b2-43e1-9477-e627558bdf8a", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 39, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af", Pod:"nginx-deployment-8587fbcb89-jgx6r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali55c89d29252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.917 [INFO][2872] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.917 [INFO][2872] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" iface="eth0" netns="" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.917 [INFO][2872] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.917 [INFO][2872] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.944 [INFO][2879] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.944 [INFO][2879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.944 [INFO][2879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.953 [WARNING][2879] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.953 [INFO][2879] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" HandleID="k8s-pod-network.0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" Workload="10.128.0.76-k8s-nginx--deployment--8587fbcb89--jgx6r-eth0" May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.955 [INFO][2879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:02.957303 env[1227]: 2025-05-10 00:40:02.956 [INFO][2872] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293" May 10 00:40:02.959459 env[1227]: time="2025-05-10T00:40:02.959367457Z" level=info msg="TearDown network for sandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" successfully" May 10 00:40:02.964187 env[1227]: time="2025-05-10T00:40:02.964144177Z" level=info msg="RemovePodSandbox \"0699c797c8599d772121e59618e050b7255c5773609032e091347f9a8dad0293\" returns successfully" May 10 00:40:03.098831 systemd[1]: run-containerd-runc-k8s.io-59bcfdcd386b0c41b602160719dcf78ca6f3095819bdd5179ac2bce18d761a79-runc.QSGTaY.mount: Deactivated successfully. May 10 00:40:03.368382 systemd-networkd[1029]: cali55c89d29252: Gained IPv6LL May 10 00:40:03.384947 kubelet[1553]: E0510 00:40:03.384887 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:03.475497 kubelet[1553]: I0510 00:40:03.475410 1553 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:40:03.475497 kubelet[1553]: I0510 00:40:03.475450 1553 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:40:03.744035 kubelet[1553]: I0510 00:40:03.743666 1553 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-tn98d" podStartSLOduration=59.053703526 podStartE2EDuration="1m1.743641513s" podCreationTimestamp="2025-05-10 00:39:02 +0000 UTC" firstStartedPulling="2025-05-10 00:39:59.946631874 +0000 UTC m=+58.395469449" lastFinishedPulling="2025-05-10 00:40:02.636569859 +0000 UTC m=+61.085407436" observedRunningTime="2025-05-10 00:40:03.743163021 +0000 UTC m=+62.192000612" watchObservedRunningTime="2025-05-10 00:40:03.743641513 +0000 UTC m=+62.192479105" May 10 00:40:04.385950 kubelet[1553]: E0510 00:40:04.385899 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:05.275130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4020483623.mount: Deactivated successfully. May 10 00:40:05.386453 kubelet[1553]: E0510 00:40:05.386406 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:05.582857 systemd[1]: run-containerd-runc-k8s.io-5ae8b65ad39f2dcdbdef227a9142f4d7201bc6c5c2213b03a0fff5735fe06fff-runc.xTBKAv.mount: Deactivated successfully. May 10 00:40:06.386806 kubelet[1553]: E0510 00:40:06.386727 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:07.107285 env[1227]: time="2025-05-10T00:40:07.107219432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:07.109578 env[1227]: time="2025-05-10T00:40:07.109534773Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:07.112466 env[1227]: time="2025-05-10T00:40:07.112426559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:07.114741 env[1227]: time="2025-05-10T00:40:07.114703747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:07.115655 env[1227]: time="2025-05-10T00:40:07.115604142Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:40:07.118356 env[1227]: time="2025-05-10T00:40:07.118307856Z" level=info msg="CreateContainer within sandbox \"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 00:40:07.133627 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3435921849.mount: Deactivated successfully. May 10 00:40:07.146201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount395304667.mount: Deactivated successfully. May 10 00:40:07.148119 env[1227]: time="2025-05-10T00:40:07.148062948Z" level=info msg="CreateContainer within sandbox \"0c03e793d73009f0f63e52dcb28e6bb7c893737a44e681067e083bea214622af\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ce485f105e2a540f735a2cf447144a31d9dbb8821a0d7ea94472014ae3005f5a\"" May 10 00:40:07.148903 env[1227]: time="2025-05-10T00:40:07.148866394Z" level=info msg="StartContainer for \"ce485f105e2a540f735a2cf447144a31d9dbb8821a0d7ea94472014ae3005f5a\"" May 10 00:40:07.173949 systemd[1]: Started cri-containerd-ce485f105e2a540f735a2cf447144a31d9dbb8821a0d7ea94472014ae3005f5a.scope. May 10 00:40:07.222458 kernel: kauditd_printk_skb: 196 callbacks suppressed May 10 00:40:07.222648 kernel: audit: type=1400 audit(1746837607.194:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.264534 kernel: audit: type=1400 audit(1746837607.194:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.264597 kernel: audit: type=1400 audit(1746837607.194:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.264633 kernel: audit: type=1400 audit(1746837607.194:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.306224 kernel: audit: type=1400 audit(1746837607.194:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.306332 kernel: audit: type=1400 audit(1746837607.194:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.353578 env[1227]: time="2025-05-10T00:40:07.353528885Z" level=info msg="StartContainer for \"ce485f105e2a540f735a2cf447144a31d9dbb8821a0d7ea94472014ae3005f5a\" returns successfully" May 10 00:40:07.369233 kernel: audit: type=1400 audit(1746837607.194:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.369337 kernel: audit: type=1400 audit(1746837607.194:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.386948 kubelet[1553]: E0510 00:40:07.386869 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:07.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.412069 kernel: audit: type=1400 audit(1746837607.194:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.412174 kernel: audit: type=1400 audit(1746837607.195:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit: BPF prog-id=117 op=LOAD May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2699 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:07.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343835663130356532613534306637333561326366343437313434 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2699 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:07.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343835663130356532613534306637333561326366343437313434 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.195000 audit: BPF prog-id=118 op=LOAD May 10 00:40:07.195000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257d00 items=0 ppid=2699 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:07.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343835663130356532613534306637333561326366343437313434 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit: BPF prog-id=119 op=LOAD May 10 00:40:07.221000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d48 items=0 ppid=2699 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:07.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343835663130356532613534306637333561326366343437313434 May 10 00:40:07.221000 audit: BPF prog-id=119 op=UNLOAD May 10 00:40:07.221000 audit: BPF prog-id=118 op=UNLOAD May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:07.221000 audit: BPF prog-id=120 op=LOAD May 10 00:40:07.221000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6158 items=0 ppid=2699 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:07.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343835663130356532613534306637333561326366343437313434 May 10 00:40:07.757701 kubelet[1553]: I0510 00:40:07.757488 1553 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-jgx6r" podStartSLOduration=13.802684213 podStartE2EDuration="18.757466409s" podCreationTimestamp="2025-05-10 00:39:49 +0000 UTC" firstStartedPulling="2025-05-10 00:40:02.162204589 +0000 UTC m=+60.611042171" lastFinishedPulling="2025-05-10 00:40:07.116986801 +0000 UTC m=+65.565824367" observedRunningTime="2025-05-10 00:40:07.756426282 +0000 UTC m=+66.205263875" watchObservedRunningTime="2025-05-10 00:40:07.757466409 +0000 UTC m=+66.206304002" May 10 00:40:08.388190 kubelet[1553]: E0510 00:40:08.388118 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:09.388501 kubelet[1553]: E0510 00:40:09.388432 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:10.388927 kubelet[1553]: E0510 00:40:10.388858 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:11.389903 kubelet[1553]: E0510 00:40:11.389837 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:12.390219 kubelet[1553]: E0510 00:40:12.390152 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:13.391341 kubelet[1553]: E0510 00:40:13.391208 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:14.391432 kubelet[1553]: E0510 00:40:14.391364 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:15.391813 kubelet[1553]: E0510 00:40:15.391753 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:16.392743 kubelet[1553]: E0510 00:40:16.392684 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:16.477088 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:40:16.477232 kernel: audit: type=1325 audit(1746837616.470:731): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.470000 audit[2969]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.495082 kernel: audit: type=1300 audit(1746837616.470:731): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffeb14d150 a2=0 a3=7fffeb14d13c items=0 ppid=1814 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.470000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffeb14d150 a2=0 a3=7fffeb14d13c items=0 ppid=1814 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.537968 systemd[1]: Created slice kubepods-besteffort-podcdb2653b_1f50_45db_90da_cb63f8d7aeb1.slice. May 10 00:40:16.527000 audit[2969]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.552394 kubelet[1553]: I0510 00:40:16.552348 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7lswf\" (UniqueName: \"kubernetes.io/projected/cdb2653b-1f50-45db-90da-cb63f8d7aeb1-kube-api-access-7lswf\") pod \"nfs-server-provisioner-0\" (UID: \"cdb2653b-1f50-45db-90da-cb63f8d7aeb1\") " pod="default/nfs-server-provisioner-0" May 10 00:40:16.552659 kubelet[1553]: I0510 00:40:16.552627 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/cdb2653b-1f50-45db-90da-cb63f8d7aeb1-data\") pod \"nfs-server-provisioner-0\" (UID: \"cdb2653b-1f50-45db-90da-cb63f8d7aeb1\") " pod="default/nfs-server-provisioner-0" May 10 00:40:16.559720 kernel: audit: type=1327 audit(1746837616.470:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.559876 kernel: audit: type=1325 audit(1746837616.527:732): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.559925 kernel: audit: type=1300 audit(1746837616.527:732): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffeb14d150 a2=0 a3=0 items=0 ppid=1814 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.527000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffeb14d150 a2=0 a3=0 items=0 ppid=1814 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.607029 kernel: audit: type=1327 audit(1746837616.527:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.616000 audit[2973]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.616000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc2ee64c70 a2=0 a3=7ffc2ee64c5c items=0 ppid=1814 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.666925 kernel: audit: type=1325 audit(1746837616.616:733): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.667080 kernel: audit: type=1300 audit(1746837616.616:733): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc2ee64c70 a2=0 a3=7ffc2ee64c5c items=0 ppid=1814 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.667137 kernel: audit: type=1327 audit(1746837616.616:733): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.684000 audit[2973]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.684000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc2ee64c70 a2=0 a3=0 items=0 ppid=1814 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:16.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:16.702089 kernel: audit: type=1325 audit(1746837616.684:734): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:16.843810 env[1227]: time="2025-05-10T00:40:16.843694554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cdb2653b-1f50-45db-90da-cb63f8d7aeb1,Namespace:default,Attempt:0,}" May 10 00:40:17.005688 systemd-networkd[1029]: cali60e51b789ff: Link UP May 10 00:40:17.009085 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:40:17.017162 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 00:40:17.017985 systemd-networkd[1029]: cali60e51b789ff: Gained carrier May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.911 [INFO][2975] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.76-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default cdb2653b-1f50-45db-90da-cb63f8d7aeb1 1231 0 2025-05-10 00:40:16 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.76 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.911 [INFO][2975] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.953 [INFO][2988] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" HandleID="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Workload="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.966 [INFO][2988] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" HandleID="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Workload="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ad60), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.76", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 00:40:16.952975104 +0000 UTC"}, Hostname:"10.128.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.966 [INFO][2988] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.966 [INFO][2988] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.966 [INFO][2988] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.76' May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.968 [INFO][2988] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.973 [INFO][2988] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.977 [INFO][2988] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.979 [INFO][2988] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.981 [INFO][2988] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.982 [INFO][2988] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.983 [INFO][2988] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.989 [INFO][2988] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.996 [INFO][2988] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.67/26] block=192.168.26.64/26 handle="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.996 [INFO][2988] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.67/26] handle="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" host="10.128.0.76" May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.996 [INFO][2988] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:17.040137 env[1227]: 2025-05-10 00:40:16.996 [INFO][2988] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.67/26] IPv6=[] ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" HandleID="k8s-pod-network.58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Workload="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.041818 env[1227]: 2025-05-10 00:40:16.998 [INFO][2975] cni-plugin/k8s.go 386: Populated endpoint ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cdb2653b-1f50-45db-90da-cb63f8d7aeb1", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 40, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:17.041818 env[1227]: 2025-05-10 00:40:16.999 [INFO][2975] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.67/32] ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.041818 env[1227]: 2025-05-10 00:40:16.999 [INFO][2975] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.041818 env[1227]: 2025-05-10 00:40:17.018 [INFO][2975] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.042247 env[1227]: 2025-05-10 00:40:17.019 [INFO][2975] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cdb2653b-1f50-45db-90da-cb63f8d7aeb1", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 40, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:a9:bf:31:de:45", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:17.042247 env[1227]: 2025-05-10 00:40:17.032 [INFO][2975] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.76-k8s-nfs--server--provisioner--0-eth0" May 10 00:40:17.077780 env[1227]: time="2025-05-10T00:40:17.077672706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:40:17.077991 env[1227]: time="2025-05-10T00:40:17.077805125Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:40:17.077991 env[1227]: time="2025-05-10T00:40:17.077850817Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:40:17.078261 env[1227]: time="2025-05-10T00:40:17.078138183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a pid=3016 runtime=io.containerd.runc.v2 May 10 00:40:17.084000 audit[3013]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:40:17.084000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffe4f3a77f0 a2=0 a3=7ffe4f3a77dc items=0 ppid=2283 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.084000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:40:17.112156 systemd[1]: run-containerd-runc-k8s.io-58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a-runc.1FrcGX.mount: Deactivated successfully. May 10 00:40:17.118308 systemd[1]: Started cri-containerd-58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a.scope. May 10 00:40:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.131000 audit: BPF prog-id=121 op=LOAD May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3016 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646231333735313661643938323965663035613833626639626162 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3016 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646231333735313661643938323965663035613833626639626162 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.132000 audit: BPF prog-id=122 op=LOAD May 10 00:40:17.132000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c20e0 items=0 ppid=3016 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646231333735313661643938323965663035613833626639626162 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit: BPF prog-id=123 op=LOAD May 10 00:40:17.133000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c2128 items=0 ppid=3016 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646231333735313661643938323965663035613833626639626162 May 10 00:40:17.133000 audit: BPF prog-id=123 op=UNLOAD May 10 00:40:17.133000 audit: BPF prog-id=122 op=UNLOAD May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:17.133000 audit: BPF prog-id=124 op=LOAD May 10 00:40:17.133000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c2538 items=0 ppid=3016 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:17.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646231333735313661643938323965663035613833626639626162 May 10 00:40:17.173890 env[1227]: time="2025-05-10T00:40:17.173136311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cdb2653b-1f50-45db-90da-cb63f8d7aeb1,Namespace:default,Attempt:0,} returns sandbox id \"58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a\"" May 10 00:40:17.176027 env[1227]: time="2025-05-10T00:40:17.175931104Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 00:40:17.393233 kubelet[1553]: E0510 00:40:17.393163 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:18.217280 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL May 10 00:40:18.393837 kubelet[1553]: E0510 00:40:18.393751 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:19.394271 kubelet[1553]: E0510 00:40:19.394209 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:19.836999 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount814591949.mount: Deactivated successfully. May 10 00:40:20.395207 kubelet[1553]: E0510 00:40:20.395140 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:21.396209 kubelet[1553]: E0510 00:40:21.396116 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:22.319081 kubelet[1553]: E0510 00:40:22.318990 1553 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:22.396693 kubelet[1553]: E0510 00:40:22.396640 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:22.875964 env[1227]: time="2025-05-10T00:40:22.875897153Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:22.878406 env[1227]: time="2025-05-10T00:40:22.878358625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:22.880570 env[1227]: time="2025-05-10T00:40:22.880526621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:22.882775 env[1227]: time="2025-05-10T00:40:22.882733523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:22.883702 env[1227]: time="2025-05-10T00:40:22.883652124Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 00:40:22.887607 env[1227]: time="2025-05-10T00:40:22.887554188Z" level=info msg="CreateContainer within sandbox \"58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 00:40:22.904738 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2406539365.mount: Deactivated successfully. May 10 00:40:22.917547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3486068160.mount: Deactivated successfully. May 10 00:40:22.918235 env[1227]: time="2025-05-10T00:40:22.917589789Z" level=info msg="CreateContainer within sandbox \"58db137516ad9829ef05a83bf9bab6d57c1e6b532a07be26cfc5900c64987d5a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"80982c79772f1affb04e1f0605c0ccaeb870d5cbabec97f80e0a4f7671c248f5\"" May 10 00:40:22.919224 env[1227]: time="2025-05-10T00:40:22.918949996Z" level=info msg="StartContainer for \"80982c79772f1affb04e1f0605c0ccaeb870d5cbabec97f80e0a4f7671c248f5\"" May 10 00:40:22.951568 systemd[1]: Started cri-containerd-80982c79772f1affb04e1f0605c0ccaeb870d5cbabec97f80e0a4f7671c248f5.scope. May 10 00:40:22.980743 kernel: kauditd_printk_skb: 62 callbacks suppressed May 10 00:40:22.980909 kernel: audit: type=1400 audit(1746837622.972:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.023063 kernel: audit: type=1400 audit(1746837622.972:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.044086 kernel: audit: type=1400 audit(1746837622.972:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.065230 kernel: audit: type=1400 audit(1746837622.972:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.107272 kernel: audit: type=1400 audit(1746837622.972:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.107527 kernel: audit: type=1400 audit(1746837622.972:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.128420 kernel: audit: type=1400 audit(1746837622.972:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.130166 env[1227]: time="2025-05-10T00:40:23.130104572Z" level=info msg="StartContainer for \"80982c79772f1affb04e1f0605c0ccaeb870d5cbabec97f80e0a4f7671c248f5\" returns successfully" May 10 00:40:22.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.171080 kernel: audit: type=1400 audit(1746837622.972:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.171189 kernel: audit: type=1400 audit(1746837622.972:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.171241 kernel: audit: type=1400 audit(1746837622.973:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.973000 audit: BPF prog-id=125 op=LOAD May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3016 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830393832633739373732663161666662303465316630363035633063 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3016 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830393832633739373732663161666662303465316630363035633063 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:22.979000 audit: BPF prog-id=126 op=LOAD May 10 00:40:22.979000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000250ce0 items=0 ppid=3016 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830393832633739373732663161666662303465316630363035633063 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit: BPF prog-id=127 op=LOAD May 10 00:40:23.000000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000250d28 items=0 ppid=3016 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:23.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830393832633739373732663161666662303465316630363035633063 May 10 00:40:23.000000 audit: BPF prog-id=127 op=UNLOAD May 10 00:40:23.000000 audit: BPF prog-id=126 op=UNLOAD May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:23.000000 audit: BPF prog-id=128 op=LOAD May 10 00:40:23.000000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000251138 items=0 ppid=3016 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:23.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830393832633739373732663161666662303465316630363035633063 May 10 00:40:23.138000 audit[3086]: AVC avc: denied { search } for pid=3086 comm="rpcbind" name="crypto" dev="proc" ino=23763 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:40:23.138000 audit[3086]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6438f8b0c0 a2=0 a3=0 items=0 ppid=3069 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 key=(null) May 10 00:40:23.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 10 00:40:23.207000 audit[3091]: AVC avc: denied { search } for pid=3091 comm="dbus-daemon" name="crypto" dev="proc" ino=23763 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:40:23.207000 audit[3091]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f19f10d70c0 a2=0 a3=0 items=0 ppid=3069 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 key=(null) May 10 00:40:23.207000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:40:23.211000 audit[3092]: AVC avc: denied { watch } for pid=3092 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=540076 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c385,c843 tclass=dir permissive=0 May 10 00:40:23.211000 audit[3092]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55fa47eb8380 a2=2c8 a3=7ffdc45be63c items=0 ppid=3069 pid=3092 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 key=(null) May 10 00:40:23.211000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:40:23.216000 audit[3093]: AVC avc: denied { read } for pid=3093 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 10 00:40:23.216000 audit[3093]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fdefa70f320 a1=80000 a2=d a3=7ffe934d7150 items=0 ppid=3069 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 key=(null) May 10 00:40:23.216000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:40:23.218000 audit[3093]: AVC avc: denied { search } for pid=3093 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23763 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:40:23.218000 audit[3093]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdef9c630c0 a2=0 a3=0 items=0 ppid=3069 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c843 key=(null) May 10 00:40:23.218000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:40:23.397855 kubelet[1553]: E0510 00:40:23.397715 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:23.828379 kubelet[1553]: I0510 00:40:23.828225 1553 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.11819788 podStartE2EDuration="7.828209477s" podCreationTimestamp="2025-05-10 00:40:16 +0000 UTC" firstStartedPulling="2025-05-10 00:40:17.175583083 +0000 UTC m=+75.624420665" lastFinishedPulling="2025-05-10 00:40:22.885594687 +0000 UTC m=+81.334432262" observedRunningTime="2025-05-10 00:40:23.826777431 +0000 UTC m=+82.275615002" watchObservedRunningTime="2025-05-10 00:40:23.828209477 +0000 UTC m=+82.277047068" May 10 00:40:23.850000 audit[3117]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:23.850000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe4c751130 a2=0 a3=7ffe4c75111c items=0 ppid=1814 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:23.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:23.858000 audit[3117]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:40:23.858000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe4c751130 a2=0 a3=7ffe4c75111c items=0 ppid=1814 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:23.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:40:24.398246 kubelet[1553]: E0510 00:40:24.398175 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:25.399409 kubelet[1553]: E0510 00:40:25.399340 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:26.400207 kubelet[1553]: E0510 00:40:26.400140 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:27.401029 kubelet[1553]: E0510 00:40:27.400961 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:28.401317 kubelet[1553]: E0510 00:40:28.401253 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:29.401784 kubelet[1553]: E0510 00:40:29.401710 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:30.402580 kubelet[1553]: E0510 00:40:30.402515 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:31.403360 kubelet[1553]: E0510 00:40:31.403298 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:32.403851 kubelet[1553]: E0510 00:40:32.403795 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:32.622815 systemd[1]: Created slice kubepods-besteffort-podff8b9a08_6b99_477d_9c49_7fadfeca4585.slice. May 10 00:40:32.767914 kubelet[1553]: I0510 00:40:32.767495 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-82d51f3b-ae66-41bd-9b6b-fc03538972ad\" (UniqueName: \"kubernetes.io/nfs/ff8b9a08-6b99-477d-9c49-7fadfeca4585-pvc-82d51f3b-ae66-41bd-9b6b-fc03538972ad\") pod \"test-pod-1\" (UID: \"ff8b9a08-6b99-477d-9c49-7fadfeca4585\") " pod="default/test-pod-1" May 10 00:40:32.767914 kubelet[1553]: I0510 00:40:32.767586 1553 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vd2ht\" (UniqueName: \"kubernetes.io/projected/ff8b9a08-6b99-477d-9c49-7fadfeca4585-kube-api-access-vd2ht\") pod \"test-pod-1\" (UID: \"ff8b9a08-6b99-477d-9c49-7fadfeca4585\") " pod="default/test-pod-1" May 10 00:40:32.898660 kernel: Failed to create system directory netfs May 10 00:40:32.898804 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:40:32.898846 kernel: audit: type=1400 audit(1746837632.891:779): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.891000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.927072 kernel: Failed to create system directory netfs May 10 00:40:32.927189 kernel: audit: type=1400 audit(1746837632.891:779): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.891000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.955143 kernel: Failed to create system directory netfs May 10 00:40:32.955255 kernel: audit: type=1400 audit(1746837632.891:779): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.891000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.983248 kernel: Failed to create system directory netfs May 10 00:40:32.983358 kernel: audit: type=1400 audit(1746837632.891:779): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.891000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:32.891000 audit[3131]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d91be3e5e0 a1=153bc a2=55d8e474b2b0 a3=5 items=0 ppid=56 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:32.891000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:40:33.055534 kernel: audit: type=1300 audit(1746837632.891:779): arch=c000003e syscall=175 success=yes exit=0 a0=55d91be3e5e0 a1=153bc a2=55d8e474b2b0 a3=5 items=0 ppid=56 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:33.055660 kernel: audit: type=1327 audit(1746837632.891:779): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:40:33.096165 kernel: Failed to create system directory fscache May 10 00:40:33.096298 kernel: audit: type=1400 audit(1746837633.058:780): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.096344 kernel: Failed to create system directory fscache May 10 00:40:33.096379 kernel: audit: type=1400 audit(1746837633.058:780): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.124403 kernel: Failed to create system directory fscache May 10 00:40:33.124500 kernel: audit: type=1400 audit(1746837633.058:780): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.152642 kernel: Failed to create system directory fscache May 10 00:40:33.152739 kernel: audit: type=1400 audit(1746837633.058:780): avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.179092 kernel: Failed to create system directory fscache May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.186075 kernel: Failed to create system directory fscache May 10 00:40:33.186157 kernel: Failed to create system directory fscache May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.196480 kernel: Failed to create system directory fscache May 10 00:40:33.196558 kernel: Failed to create system directory fscache May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.206854 kernel: Failed to create system directory fscache May 10 00:40:33.206912 kernel: Failed to create system directory fscache May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.222421 kernel: Failed to create system directory fscache May 10 00:40:33.222524 kernel: Failed to create system directory fscache May 10 00:40:33.222573 kernel: Failed to create system directory fscache May 10 00:40:33.058000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.232067 kernel: FS-Cache: Loaded May 10 00:40:33.058000 audit[3131]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d91c0539c0 a1=4c0fc a2=55d8e474b2b0 a3=5 items=0 ppid=56 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:33.058000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.283349 kernel: Failed to create system directory sunrpc May 10 00:40:33.283440 kernel: Failed to create system directory sunrpc May 10 00:40:33.283474 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.293647 kernel: Failed to create system directory sunrpc May 10 00:40:33.293736 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.303826 kernel: Failed to create system directory sunrpc May 10 00:40:33.303918 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.314093 kernel: Failed to create system directory sunrpc May 10 00:40:33.314177 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.324366 kernel: Failed to create system directory sunrpc May 10 00:40:33.324472 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.334587 kernel: Failed to create system directory sunrpc May 10 00:40:33.334671 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.344802 kernel: Failed to create system directory sunrpc May 10 00:40:33.344881 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.355033 kernel: Failed to create system directory sunrpc May 10 00:40:33.355137 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.365324 kernel: Failed to create system directory sunrpc May 10 00:40:33.365413 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.375603 kernel: Failed to create system directory sunrpc May 10 00:40:33.375684 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.385830 kernel: Failed to create system directory sunrpc May 10 00:40:33.385915 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.396066 kernel: Failed to create system directory sunrpc May 10 00:40:33.396138 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.404578 kubelet[1553]: E0510 00:40:33.404483 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:33.406333 kernel: Failed to create system directory sunrpc May 10 00:40:33.406399 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.416587 kernel: Failed to create system directory sunrpc May 10 00:40:33.416672 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.426804 kernel: Failed to create system directory sunrpc May 10 00:40:33.426904 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.437016 kernel: Failed to create system directory sunrpc May 10 00:40:33.437094 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.447313 kernel: Failed to create system directory sunrpc May 10 00:40:33.447410 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.457550 kernel: Failed to create system directory sunrpc May 10 00:40:33.457635 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.467745 kernel: Failed to create system directory sunrpc May 10 00:40:33.467827 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.477954 kernel: Failed to create system directory sunrpc May 10 00:40:33.478025 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.488137 kernel: Failed to create system directory sunrpc May 10 00:40:33.488198 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.498339 kernel: Failed to create system directory sunrpc May 10 00:40:33.498402 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.508588 kernel: Failed to create system directory sunrpc May 10 00:40:33.508662 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.513689 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.523988 kernel: Failed to create system directory sunrpc May 10 00:40:33.524091 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.534114 kernel: Failed to create system directory sunrpc May 10 00:40:33.534175 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.544346 kernel: Failed to create system directory sunrpc May 10 00:40:33.544447 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.554623 kernel: Failed to create system directory sunrpc May 10 00:40:33.554710 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.564778 kernel: Failed to create system directory sunrpc May 10 00:40:33.564860 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.574999 kernel: Failed to create system directory sunrpc May 10 00:40:33.575104 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.585281 kernel: Failed to create system directory sunrpc May 10 00:40:33.585376 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.595488 kernel: Failed to create system directory sunrpc May 10 00:40:33.595604 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.605721 kernel: Failed to create system directory sunrpc May 10 00:40:33.605838 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.610869 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.621126 kernel: Failed to create system directory sunrpc May 10 00:40:33.621247 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.626386 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.631639 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.636749 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.646977 kernel: Failed to create system directory sunrpc May 10 00:40:33.647134 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.657213 kernel: Failed to create system directory sunrpc May 10 00:40:33.657308 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.662368 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.667522 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.677744 kernel: Failed to create system directory sunrpc May 10 00:40:33.677841 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.687934 kernel: Failed to create system directory sunrpc May 10 00:40:33.688058 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.698172 kernel: Failed to create system directory sunrpc May 10 00:40:33.698279 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.708384 kernel: Failed to create system directory sunrpc May 10 00:40:33.708483 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.718640 kernel: Failed to create system directory sunrpc May 10 00:40:33.718743 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.723674 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.734100 kernel: Failed to create system directory sunrpc May 10 00:40:33.734202 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.740076 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.749406 kernel: Failed to create system directory sunrpc May 10 00:40:33.749484 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.755133 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.764859 kernel: Failed to create system directory sunrpc May 10 00:40:33.764968 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.775197 kernel: Failed to create system directory sunrpc May 10 00:40:33.775310 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.780422 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.785608 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.795928 kernel: Failed to create system directory sunrpc May 10 00:40:33.796075 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.802077 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.811457 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.812126 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.821959 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.832384 kernel: Failed to create system directory sunrpc May 10 00:40:33.832488 kernel: Failed to create system directory sunrpc May 10 00:40:33.832530 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.839309 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.847913 kernel: Failed to create system directory sunrpc May 10 00:40:33.848002 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.853010 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.858184 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.868398 kernel: Failed to create system directory sunrpc May 10 00:40:33.868483 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.878756 kernel: Failed to create system directory sunrpc May 10 00:40:33.878875 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.883882 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.894119 kernel: Failed to create system directory sunrpc May 10 00:40:33.894228 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.904312 kernel: Failed to create system directory sunrpc May 10 00:40:33.904399 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.914521 kernel: Failed to create system directory sunrpc May 10 00:40:33.914627 kernel: Failed to create system directory sunrpc May 10 00:40:33.260000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.939427 kernel: RPC: Registered named UNIX socket transport module. May 10 00:40:33.939519 kernel: RPC: Registered udp transport module. May 10 00:40:33.939567 kernel: RPC: Registered tcp transport module. May 10 00:40:33.944212 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 00:40:33.260000 audit[3131]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d91c09fad0 a1=1a814c a2=55d8e474b2b0 a3=5 items=6 ppid=56 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:33.260000 audit: CWD cwd="/" May 10 00:40:33.260000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PATH item=1 name=(null) inode=24020 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PATH item=2 name=(null) inode=24020 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PATH item=3 name=(null) inode=24021 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PATH item=4 name=(null) inode=24020 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PATH item=5 name=(null) inode=24022 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:33.260000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.009096 kernel: Failed to create system directory nfs May 10 00:40:34.009184 kernel: Failed to create system directory nfs May 10 00:40:34.009228 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.018753 kernel: Failed to create system directory nfs May 10 00:40:34.018863 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.028423 kernel: Failed to create system directory nfs May 10 00:40:34.028521 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.038145 kernel: Failed to create system directory nfs May 10 00:40:34.038233 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.047859 kernel: Failed to create system directory nfs May 10 00:40:34.047946 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.057583 kernel: Failed to create system directory nfs May 10 00:40:34.057672 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.067275 kernel: Failed to create system directory nfs May 10 00:40:34.067376 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.077002 kernel: Failed to create system directory nfs May 10 00:40:34.077112 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.086712 kernel: Failed to create system directory nfs May 10 00:40:34.086838 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.096457 kernel: Failed to create system directory nfs May 10 00:40:34.096546 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.101314 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.110991 kernel: Failed to create system directory nfs May 10 00:40:34.111104 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.120726 kernel: Failed to create system directory nfs May 10 00:40:34.120836 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.130395 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.135747 kernel: Failed to create system directory nfs May 10 00:40:34.135862 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.140675 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.150358 kernel: Failed to create system directory nfs May 10 00:40:34.150446 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.160144 kernel: Failed to create system directory nfs May 10 00:40:34.160242 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.169836 kernel: Failed to create system directory nfs May 10 00:40:34.169895 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.179568 kernel: Failed to create system directory nfs May 10 00:40:34.179670 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.189246 kernel: Failed to create system directory nfs May 10 00:40:34.189331 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.198943 kernel: Failed to create system directory nfs May 10 00:40:34.199034 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.208644 kernel: Failed to create system directory nfs May 10 00:40:34.208743 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.216123 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.223442 kernel: Failed to create system directory nfs May 10 00:40:34.227461 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.233391 kernel: Failed to create system directory nfs May 10 00:40:34.233463 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.243189 kernel: Failed to create system directory nfs May 10 00:40:34.243245 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.252945 kernel: Failed to create system directory nfs May 10 00:40:34.253015 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.262742 kernel: Failed to create system directory nfs May 10 00:40:34.262825 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.268120 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.273071 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.282257 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.287214 kernel: Failed to create system directory nfs May 10 00:40:34.287278 kernel: Failed to create system directory nfs May 10 00:40:33.989000 audit[3131]: AVC avc: denied { confidentiality } for pid=3131 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:33.989000 audit[3131]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d91c2c0a10 a1=16eae4 a2=55d8e474b2b0 a3=5 items=0 ppid=56 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:33.989000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:40:34.320075 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.380248 kernel: Failed to create system directory nfs4 May 10 00:40:34.380316 kernel: Failed to create system directory nfs4 May 10 00:40:34.380366 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.390216 kernel: Failed to create system directory nfs4 May 10 00:40:34.390288 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.400138 kernel: Failed to create system directory nfs4 May 10 00:40:34.400204 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.405504 kubelet[1553]: E0510 00:40:34.405461 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:34.410070 kernel: Failed to create system directory nfs4 May 10 00:40:34.410136 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.419885 kernel: Failed to create system directory nfs4 May 10 00:40:34.419977 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.429766 kernel: Failed to create system directory nfs4 May 10 00:40:34.429871 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.439666 kernel: Failed to create system directory nfs4 May 10 00:40:34.439753 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.449627 kernel: Failed to create system directory nfs4 May 10 00:40:34.449718 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.459571 kernel: Failed to create system directory nfs4 May 10 00:40:34.459622 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.469486 kernel: Failed to create system directory nfs4 May 10 00:40:34.469550 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.479408 kernel: Failed to create system directory nfs4 May 10 00:40:34.479470 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.489324 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.494333 kernel: Failed to create system directory nfs4 May 10 00:40:34.494405 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.504243 kernel: Failed to create system directory nfs4 May 10 00:40:34.504303 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.514153 kernel: Failed to create system directory nfs4 May 10 00:40:34.514223 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.524069 kernel: Failed to create system directory nfs4 May 10 00:40:34.524157 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.534424 kernel: Failed to create system directory nfs4 May 10 00:40:34.534507 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.544341 kernel: Failed to create system directory nfs4 May 10 00:40:34.544422 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.554263 kernel: Failed to create system directory nfs4 May 10 00:40:34.554347 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.564193 kernel: Failed to create system directory nfs4 May 10 00:40:34.564297 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.574224 kernel: Failed to create system directory nfs4 May 10 00:40:34.574330 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.584163 kernel: Failed to create system directory nfs4 May 10 00:40:34.584256 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.594146 kernel: Failed to create system directory nfs4 May 10 00:40:34.594221 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.604017 kernel: Failed to create system directory nfs4 May 10 00:40:34.604189 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.613933 kernel: Failed to create system directory nfs4 May 10 00:40:34.614004 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.623868 kernel: Failed to create system directory nfs4 May 10 00:40:34.623963 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.633985 kernel: Failed to create system directory nfs4 May 10 00:40:34.634108 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.643922 kernel: Failed to create system directory nfs4 May 10 00:40:34.644008 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.653842 kernel: Failed to create system directory nfs4 May 10 00:40:34.653922 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.663764 kernel: Failed to create system directory nfs4 May 10 00:40:34.663858 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.673715 kernel: Failed to create system directory nfs4 May 10 00:40:34.673835 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.683679 kernel: Failed to create system directory nfs4 May 10 00:40:34.683753 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.693592 kernel: Failed to create system directory nfs4 May 10 00:40:34.693672 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.703632 kernel: Failed to create system directory nfs4 May 10 00:40:34.703733 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.713525 kernel: Failed to create system directory nfs4 May 10 00:40:34.713609 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.723489 kernel: Failed to create system directory nfs4 May 10 00:40:34.723564 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.733402 kernel: Failed to create system directory nfs4 May 10 00:40:34.733497 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.743295 kernel: Failed to create system directory nfs4 May 10 00:40:34.743368 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.753190 kernel: Failed to create system directory nfs4 May 10 00:40:34.753265 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.763116 kernel: Failed to create system directory nfs4 May 10 00:40:34.763196 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.773023 kernel: Failed to create system directory nfs4 May 10 00:40:34.773127 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.782957 kernel: Failed to create system directory nfs4 May 10 00:40:34.783029 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.792895 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.802974 kernel: Failed to create system directory nfs4 May 10 00:40:34.803064 kernel: Failed to create system directory nfs4 May 10 00:40:34.803116 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.812893 kernel: Failed to create system directory nfs4 May 10 00:40:34.812967 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.822894 kernel: Failed to create system directory nfs4 May 10 00:40:34.822970 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.832806 kernel: Failed to create system directory nfs4 May 10 00:40:34.832900 kernel: Failed to create system directory nfs4 May 10 00:40:34.355000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:34.989266 kernel: NFS: Registering the id_resolver key type May 10 00:40:34.989445 kernel: Key type id_resolver registered May 10 00:40:34.989492 kernel: Key type id_legacy registered May 10 00:40:34.355000 audit[3136]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6ba04d2010 a1=209404 a2=55f2b81892b0 a3=5 items=0 ppid=56 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:34.355000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.020841 kernel: Failed to create system directory rpcgss May 10 00:40:35.020932 kernel: Failed to create system directory rpcgss May 10 00:40:35.020977 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.031086 kernel: Failed to create system directory rpcgss May 10 00:40:35.031161 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.041287 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.042075 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.051730 kernel: Failed to create system directory rpcgss May 10 00:40:35.051816 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.061964 kernel: Failed to create system directory rpcgss May 10 00:40:35.062024 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.072202 kernel: Failed to create system directory rpcgss May 10 00:40:35.072264 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.082484 kernel: Failed to create system directory rpcgss May 10 00:40:35.082580 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.092750 kernel: Failed to create system directory rpcgss May 10 00:40:35.092822 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.098132 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.113314 kernel: Failed to create system directory rpcgss May 10 00:40:35.113378 kernel: Failed to create system directory rpcgss May 10 00:40:35.113423 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.123535 kernel: Failed to create system directory rpcgss May 10 00:40:35.123608 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.133761 kernel: Failed to create system directory rpcgss May 10 00:40:35.133845 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.007000 audit[3137]: AVC avc: denied { confidentiality } for pid=3137 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:40:35.144063 kernel: Failed to create system directory rpcgss May 10 00:40:35.007000 audit[3137]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc543b72010 a1=70b64 a2=564c4a3b22b0 a3=5 items=0 ppid=56 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.007000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 00:40:35.173859 nfsidmap[3144]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' May 10 00:40:35.184603 nfsidmap[3145]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' May 10 00:40:35.200000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.200000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563bf1f56cc0 a2=10 a3=34297b9f89c37d49 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.200000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:40:35.200000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.200000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563bf1f56cc0 a2=10 a3=34297b9f89c37d49 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.200000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:40:35.200000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.200000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563bf1f56cc0 a2=10 a3=34297b9f89c37d49 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.200000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:40:35.200000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.201000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.201000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2739 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:40:35.328253 env[1227]: time="2025-05-10T00:40:35.328098014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ff8b9a08-6b99-477d-9c49-7fadfeca4585,Namespace:default,Attempt:0,}" May 10 00:40:35.406388 kubelet[1553]: E0510 00:40:35.406329 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:35.488910 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP May 10 00:40:35.501390 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:40:35.501774 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 00:40:35.502219 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.398 [INFO][3147] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.76-k8s-test--pod--1-eth0 default ff8b9a08-6b99-477d-9c49-7fadfeca4585 1292 0 2025-05-10 00:40:17 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.76 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.398 [INFO][3147] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.431 [INFO][3159] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" HandleID="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Workload="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.448 [INFO][3159] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" HandleID="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Workload="10.128.0.76-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d790), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.76", "pod":"test-pod-1", "timestamp":"2025-05-10 00:40:35.431941916 +0000 UTC"}, Hostname:"10.128.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.448 [INFO][3159] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.448 [INFO][3159] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.448 [INFO][3159] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.76' May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.451 [INFO][3159] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.455 [INFO][3159] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.460 [INFO][3159] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.463 [INFO][3159] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.466 [INFO][3159] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.466 [INFO][3159] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.468 [INFO][3159] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.473 [INFO][3159] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.482 [INFO][3159] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.68/26] block=192.168.26.64/26 handle="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.482 [INFO][3159] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.68/26] handle="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" host="10.128.0.76" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.482 [INFO][3159] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.482 [INFO][3159] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.68/26] IPv6=[] ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" HandleID="k8s-pod-network.21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Workload="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.520548 env[1227]: 2025-05-10 00:40:35.483 [INFO][3147] cni-plugin/k8s.go 386: Populated endpoint ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ff8b9a08-6b99-477d-9c49-7fadfeca4585", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 40, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:35.521901 env[1227]: 2025-05-10 00:40:35.484 [INFO][3147] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.68/32] ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.521901 env[1227]: 2025-05-10 00:40:35.484 [INFO][3147] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.521901 env[1227]: 2025-05-10 00:40:35.502 [INFO][3147] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.521901 env[1227]: 2025-05-10 00:40:35.503 [INFO][3147] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.76-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ff8b9a08-6b99-477d-9c49-7fadfeca4585", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 40, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.76", ContainerID:"21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"06:87:e8:08:0f:ec", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:40:35.521901 env[1227]: 2025-05-10 00:40:35.512 [INFO][3147] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.76-k8s-test--pod--1-eth0" May 10 00:40:35.537000 audit[3180]: NETFILTER_CFG table=filter:80 family=2 entries=44 op=nft_register_chain pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:40:35.537000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7ffd31527350 a2=0 a3=7ffd3152733c items=0 ppid=2283 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:40:35.548991 env[1227]: time="2025-05-10T00:40:35.545520704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:40:35.548991 env[1227]: time="2025-05-10T00:40:35.545569440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:40:35.548991 env[1227]: time="2025-05-10T00:40:35.545588559Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:40:35.548991 env[1227]: time="2025-05-10T00:40:35.545851319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d pid=3188 runtime=io.containerd.runc.v2 May 10 00:40:35.581625 systemd[1]: Started cri-containerd-21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d.scope. May 10 00:40:35.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.618000 audit: BPF prog-id=129 op=LOAD May 10 00:40:35.620000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.620000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3188 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303933656236343766353830326262636230656138376465666361 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=3188 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303933656236343766353830326262636230656138376465666361 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.621000 audit: BPF prog-id=130 op=LOAD May 10 00:40:35.621000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001cc160 items=0 ppid=3188 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303933656236343766353830326262636230656138376465666361 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.622000 audit: BPF prog-id=131 op=LOAD May 10 00:40:35.622000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001cc1a8 items=0 ppid=3188 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303933656236343766353830326262636230656138376465666361 May 10 00:40:35.623000 audit: BPF prog-id=131 op=UNLOAD May 10 00:40:35.624000 audit: BPF prog-id=130 op=UNLOAD May 10 00:40:35.624000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.624000 audit: BPF prog-id=132 op=LOAD May 10 00:40:35.624000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001cc5b8 items=0 ppid=3188 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303933656236343766353830326262636230656138376465666361 May 10 00:40:35.669989 env[1227]: time="2025-05-10T00:40:35.669935206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ff8b9a08-6b99-477d-9c49-7fadfeca4585,Namespace:default,Attempt:0,} returns sandbox id \"21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d\"" May 10 00:40:35.674948 env[1227]: time="2025-05-10T00:40:35.674909371Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:40:35.862298 env[1227]: time="2025-05-10T00:40:35.862152023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:35.865405 env[1227]: time="2025-05-10T00:40:35.865360896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:35.867678 env[1227]: time="2025-05-10T00:40:35.867638724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:35.872504 env[1227]: time="2025-05-10T00:40:35.872456768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:40:35.873427 env[1227]: time="2025-05-10T00:40:35.873375443Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:40:35.876892 env[1227]: time="2025-05-10T00:40:35.876852629Z" level=info msg="CreateContainer within sandbox \"21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 00:40:35.890707 env[1227]: time="2025-05-10T00:40:35.890659863Z" level=info msg="CreateContainer within sandbox \"21093eb647f5802bbcb0ea87defcafb99709006fc3e8eb60041225965ef6c33d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b809cdd1b4eb423272ecf748b5d19e62aefedb594065233b5bf73e1876be6651\"" May 10 00:40:35.891492 env[1227]: time="2025-05-10T00:40:35.891455154Z" level=info msg="StartContainer for \"b809cdd1b4eb423272ecf748b5d19e62aefedb594065233b5bf73e1876be6651\"" May 10 00:40:35.915094 systemd[1]: Started cri-containerd-b809cdd1b4eb423272ecf748b5d19e62aefedb594065233b5bf73e1876be6651.scope. May 10 00:40:35.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit: BPF prog-id=133 op=LOAD May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3188 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303963646431623465623432333237326563663734386235643139 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3188 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303963646431623465623432333237326563663734386235643139 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit: BPF prog-id=134 op=LOAD May 10 00:40:35.935000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000266f90 items=0 ppid=3188 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303963646431623465623432333237326563663734386235643139 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.935000 audit: BPF prog-id=135 op=LOAD May 10 00:40:35.935000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000266fd8 items=0 ppid=3188 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303963646431623465623432333237326563663734386235643139 May 10 00:40:35.935000 audit: BPF prog-id=135 op=UNLOAD May 10 00:40:35.935000 audit: BPF prog-id=134 op=UNLOAD May 10 00:40:35.936000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:40:35.936000 audit: BPF prog-id=136 op=LOAD May 10 00:40:35.936000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002673e8 items=0 ppid=3188 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:35.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303963646431623465623432333237326563663734386235643139 May 10 00:40:35.957355 env[1227]: time="2025-05-10T00:40:35.957308154Z" level=info msg="StartContainer for \"b809cdd1b4eb423272ecf748b5d19e62aefedb594065233b5bf73e1876be6651\" returns successfully" May 10 00:40:36.407173 kubelet[1553]: E0510 00:40:36.407108 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:37.161133 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL May 10 00:40:37.408163 kubelet[1553]: E0510 00:40:37.408093 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:38.408793 kubelet[1553]: E0510 00:40:38.408726 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:39.409356 kubelet[1553]: E0510 00:40:39.409296 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:40.409834 kubelet[1553]: E0510 00:40:40.409773 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:41.410647 kubelet[1553]: E0510 00:40:41.410582 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:42.319284 kubelet[1553]: E0510 00:40:42.319217 1553 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:42.411243 kubelet[1553]: E0510 00:40:42.411184 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:43.411787 kubelet[1553]: E0510 00:40:43.411717 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:40:44.412784 kubelet[1553]: E0510 00:40:44.412725 1553 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"