May 10 00:45:36.228307 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:45:36.228329 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:45:36.228340 kernel: BIOS-provided physical RAM map: May 10 00:45:36.228346 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:45:36.228351 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:45:36.228357 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:45:36.228364 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:45:36.228370 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:45:36.228375 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:45:36.228382 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:45:36.228388 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 10 00:45:36.228394 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:45:36.228399 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:45:36.228405 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:45:36.228413 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:45:36.228420 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:45:36.228427 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:45:36.228433 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:45:36.228442 kernel: NX (Execute Disable) protection: active May 10 00:45:36.228448 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:45:36.228454 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:45:36.228460 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:45:36.228466 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:45:36.228472 kernel: extended physical RAM map: May 10 00:45:36.228478 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:45:36.228486 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:45:36.228492 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:45:36.228498 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:45:36.228505 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:45:36.228511 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:45:36.228517 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:45:36.228523 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 10 00:45:36.228529 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 10 00:45:36.228535 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 10 00:45:36.228548 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 10 00:45:36.228554 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 10 00:45:36.228562 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:45:36.228568 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:45:36.228574 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:45:36.228580 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:45:36.228589 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:45:36.228596 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:45:36.228603 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:45:36.228611 kernel: efi: EFI v2.70 by EDK II May 10 00:45:36.228618 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 10 00:45:36.228625 kernel: random: crng init done May 10 00:45:36.228631 kernel: SMBIOS 2.8 present. May 10 00:45:36.228638 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 10 00:45:36.228645 kernel: Hypervisor detected: KVM May 10 00:45:36.228651 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:45:36.228658 kernel: kvm-clock: cpu 0, msr 48196001, primary cpu clock May 10 00:45:36.228664 kernel: kvm-clock: using sched offset of 5471505771 cycles May 10 00:45:36.228688 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:45:36.228695 kernel: tsc: Detected 2794.748 MHz processor May 10 00:45:36.228703 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:45:36.228710 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:45:36.228717 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 10 00:45:36.228724 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:45:36.228731 kernel: Using GB pages for direct mapping May 10 00:45:36.228738 kernel: Secure boot disabled May 10 00:45:36.228745 kernel: ACPI: Early table checksum verification disabled May 10 00:45:36.228755 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 10 00:45:36.228763 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 10 00:45:36.228769 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228776 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228785 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 10 00:45:36.228792 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228799 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228808 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228814 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:45:36.228823 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 10 00:45:36.228830 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 10 00:45:36.228836 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 10 00:45:36.228844 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 10 00:45:36.228850 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 10 00:45:36.228857 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 10 00:45:36.228864 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 10 00:45:36.228870 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 10 00:45:36.228877 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 10 00:45:36.228885 kernel: No NUMA configuration found May 10 00:45:36.228892 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 10 00:45:36.228898 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 10 00:45:36.228905 kernel: Zone ranges: May 10 00:45:36.228912 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:45:36.228918 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 10 00:45:36.228925 kernel: Normal empty May 10 00:45:36.228945 kernel: Movable zone start for each node May 10 00:45:36.228957 kernel: Early memory node ranges May 10 00:45:36.228966 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:45:36.228972 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 10 00:45:36.228979 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 10 00:45:36.228986 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 10 00:45:36.228993 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 10 00:45:36.228999 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 10 00:45:36.229006 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 10 00:45:36.229013 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:45:36.229019 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:45:36.229026 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 10 00:45:36.229034 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:45:36.229041 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 10 00:45:36.229048 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:45:36.229055 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 10 00:45:36.229062 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:45:36.229068 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:45:36.229075 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:45:36.229082 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:45:36.229088 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:45:36.229097 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:45:36.229103 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:45:36.229110 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:45:36.229128 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:45:36.229137 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:45:36.229144 kernel: TSC deadline timer available May 10 00:45:36.229151 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:45:36.229157 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:45:36.229164 kernel: kvm-guest: setup PV sched yield May 10 00:45:36.229173 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:45:36.229180 kernel: Booting paravirtualized kernel on KVM May 10 00:45:36.229193 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:45:36.229201 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:45:36.229209 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:45:36.229216 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:45:36.229222 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:45:36.229229 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:45:36.229236 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 10 00:45:36.229243 kernel: kvm-guest: PV spinlocks enabled May 10 00:45:36.229251 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:45:36.229258 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 10 00:45:36.229266 kernel: Policy zone: DMA32 May 10 00:45:36.229274 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:45:36.229282 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:45:36.229289 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:45:36.229298 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:45:36.229305 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:45:36.229312 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 10 00:45:36.229319 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:45:36.229327 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:45:36.229334 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:45:36.229341 kernel: rcu: Hierarchical RCU implementation. May 10 00:45:36.229348 kernel: rcu: RCU event tracing is enabled. May 10 00:45:36.229356 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:45:36.229364 kernel: Rude variant of Tasks RCU enabled. May 10 00:45:36.229372 kernel: Tracing variant of Tasks RCU enabled. May 10 00:45:36.229379 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:45:36.229386 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:45:36.229393 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:45:36.229400 kernel: Console: colour dummy device 80x25 May 10 00:45:36.229407 kernel: printk: console [ttyS0] enabled May 10 00:45:36.229414 kernel: ACPI: Core revision 20210730 May 10 00:45:36.229421 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:45:36.229430 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:45:36.229437 kernel: x2apic enabled May 10 00:45:36.229444 kernel: Switched APIC routing to physical x2apic. May 10 00:45:36.229452 kernel: kvm-guest: setup PV IPIs May 10 00:45:36.229459 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:45:36.229466 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:45:36.229473 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:45:36.229480 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:45:36.229489 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:45:36.229498 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:45:36.229505 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:45:36.229512 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:45:36.229519 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:45:36.229526 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:45:36.229534 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:45:36.229547 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:45:36.229557 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:45:36.229564 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:45:36.229573 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:45:36.229580 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:45:36.229588 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:45:36.229595 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:45:36.229602 kernel: Freeing SMP alternatives memory: 32K May 10 00:45:36.229609 kernel: pid_max: default: 32768 minimum: 301 May 10 00:45:36.229616 kernel: LSM: Security Framework initializing May 10 00:45:36.229623 kernel: SELinux: Initializing. May 10 00:45:36.229630 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:45:36.229639 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:45:36.229646 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:45:36.229653 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:45:36.229660 kernel: ... version: 0 May 10 00:45:36.229667 kernel: ... bit width: 48 May 10 00:45:36.229684 kernel: ... generic registers: 6 May 10 00:45:36.229691 kernel: ... value mask: 0000ffffffffffff May 10 00:45:36.229699 kernel: ... max period: 00007fffffffffff May 10 00:45:36.229706 kernel: ... fixed-purpose events: 0 May 10 00:45:36.229714 kernel: ... event mask: 000000000000003f May 10 00:45:36.229723 kernel: signal: max sigframe size: 1776 May 10 00:45:36.229732 kernel: rcu: Hierarchical SRCU implementation. May 10 00:45:36.229742 kernel: smp: Bringing up secondary CPUs ... May 10 00:45:36.229750 kernel: x86: Booting SMP configuration: May 10 00:45:36.229759 kernel: .... node #0, CPUs: #1 May 10 00:45:36.229768 kernel: kvm-clock: cpu 1, msr 48196041, secondary cpu clock May 10 00:45:36.229779 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:45:36.229791 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 10 00:45:36.229805 kernel: #2 May 10 00:45:36.229827 kernel: kvm-clock: cpu 2, msr 48196081, secondary cpu clock May 10 00:45:36.229839 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:45:36.229848 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 10 00:45:36.229857 kernel: #3 May 10 00:45:36.229866 kernel: kvm-clock: cpu 3, msr 481960c1, secondary cpu clock May 10 00:45:36.229876 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:45:36.229885 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 10 00:45:36.229893 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:45:36.229909 kernel: smpboot: Max logical packages: 1 May 10 00:45:36.229918 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:45:36.229927 kernel: devtmpfs: initialized May 10 00:45:36.229936 kernel: x86/mm: Memory block size: 128MB May 10 00:45:36.229945 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 10 00:45:36.229954 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 10 00:45:36.229963 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 10 00:45:36.229972 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 10 00:45:36.229980 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 10 00:45:36.229989 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:45:36.229996 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:45:36.230003 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:45:36.230010 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:45:36.230017 kernel: audit: initializing netlink subsys (disabled) May 10 00:45:36.233129 kernel: audit: type=2000 audit(1746837935.564:1): state=initialized audit_enabled=0 res=1 May 10 00:45:36.233147 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:45:36.233157 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:45:36.233164 kernel: cpuidle: using governor menu May 10 00:45:36.233175 kernel: ACPI: bus type PCI registered May 10 00:45:36.233183 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:45:36.233190 kernel: dca service started, version 1.12.1 May 10 00:45:36.233197 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:45:36.233204 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:45:36.233212 kernel: PCI: Using configuration type 1 for base access May 10 00:45:36.233219 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:45:36.233226 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:45:36.233233 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:45:36.233242 kernel: ACPI: Added _OSI(Module Device) May 10 00:45:36.233249 kernel: ACPI: Added _OSI(Processor Device) May 10 00:45:36.233257 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:45:36.233266 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:45:36.233275 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:45:36.233284 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:45:36.233293 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:45:36.233301 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:45:36.233308 kernel: ACPI: Interpreter enabled May 10 00:45:36.233317 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:45:36.233324 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:45:36.233331 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:45:36.233338 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:45:36.233346 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:45:36.233492 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:45:36.233581 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:45:36.233657 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:45:36.233669 kernel: PCI host bridge to bus 0000:00 May 10 00:45:36.233792 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:45:36.233864 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:45:36.233931 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:45:36.233997 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:45:36.234062 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:45:36.234128 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 10 00:45:36.234198 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:45:36.234306 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:45:36.234399 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:45:36.234474 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 10 00:45:36.234575 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 10 00:45:36.234651 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:45:36.234769 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 10 00:45:36.234847 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:45:36.234968 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:45:36.235052 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 10 00:45:36.235127 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 10 00:45:36.235201 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 10 00:45:36.235296 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:45:36.235375 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 10 00:45:36.235448 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 10 00:45:36.235528 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 10 00:45:36.235647 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:45:36.238748 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 10 00:45:36.238846 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 10 00:45:36.238921 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 10 00:45:36.239000 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 10 00:45:36.239091 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:45:36.239167 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:45:36.239256 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:45:36.239332 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 10 00:45:36.239407 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 10 00:45:36.239501 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:45:36.239586 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 10 00:45:36.239596 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:45:36.239604 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:45:36.239611 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:45:36.239619 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:45:36.239626 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:45:36.239633 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:45:36.239643 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:45:36.239650 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:45:36.239657 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:45:36.239664 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:45:36.239688 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:45:36.239696 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:45:36.239703 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:45:36.239710 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:45:36.239717 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:45:36.239736 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:45:36.239745 kernel: iommu: Default domain type: Translated May 10 00:45:36.239756 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:45:36.239876 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:45:36.239985 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:45:36.240063 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:45:36.240072 kernel: vgaarb: loaded May 10 00:45:36.240079 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:45:36.240087 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:45:36.240098 kernel: PTP clock support registered May 10 00:45:36.240106 kernel: Registered efivars operations May 10 00:45:36.240113 kernel: PCI: Using ACPI for IRQ routing May 10 00:45:36.240120 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:45:36.240128 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 10 00:45:36.240135 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 10 00:45:36.240142 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 10 00:45:36.240149 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 10 00:45:36.240156 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 10 00:45:36.240165 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 10 00:45:36.240172 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:45:36.240179 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:45:36.240187 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:45:36.240194 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:45:36.240201 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:45:36.240209 kernel: pnp: PnP ACPI init May 10 00:45:36.240307 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:45:36.240320 kernel: pnp: PnP ACPI: found 6 devices May 10 00:45:36.240328 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:45:36.240335 kernel: NET: Registered PF_INET protocol family May 10 00:45:36.240342 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:45:36.240350 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:45:36.240357 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:45:36.240364 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:45:36.240371 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:45:36.240379 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:45:36.240388 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:45:36.240395 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:45:36.240402 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:45:36.240410 kernel: NET: Registered PF_XDP protocol family May 10 00:45:36.240486 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 10 00:45:36.240573 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 10 00:45:36.240666 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:45:36.240771 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:45:36.240871 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:45:36.240968 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:45:36.241398 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:45:36.241493 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 10 00:45:36.241503 kernel: PCI: CLS 0 bytes, default 64 May 10 00:45:36.241511 kernel: Initialise system trusted keyrings May 10 00:45:36.241533 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:45:36.241550 kernel: Key type asymmetric registered May 10 00:45:36.241561 kernel: Asymmetric key parser 'x509' registered May 10 00:45:36.241569 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:45:36.241577 kernel: io scheduler mq-deadline registered May 10 00:45:36.241594 kernel: io scheduler kyber registered May 10 00:45:36.241603 kernel: io scheduler bfq registered May 10 00:45:36.241611 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:45:36.241619 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:45:36.241627 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:45:36.241634 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:45:36.241642 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:45:36.241651 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:45:36.241669 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:45:36.241697 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:45:36.241704 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:45:36.241842 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:45:36.241857 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:45:36.241945 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:45:36.242026 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:45:35 UTC (1746837935) May 10 00:45:36.242100 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:45:36.242109 kernel: efifb: probing for efifb May 10 00:45:36.242117 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 10 00:45:36.242125 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 10 00:45:36.242132 kernel: efifb: scrolling: redraw May 10 00:45:36.242140 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:45:36.242148 kernel: Console: switching to colour frame buffer device 160x50 May 10 00:45:36.242156 kernel: fb0: EFI VGA frame buffer device May 10 00:45:36.242165 kernel: pstore: Registered efi as persistent store backend May 10 00:45:36.242173 kernel: NET: Registered PF_INET6 protocol family May 10 00:45:36.242181 kernel: Segment Routing with IPv6 May 10 00:45:36.242189 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:45:36.242198 kernel: NET: Registered PF_PACKET protocol family May 10 00:45:36.242206 kernel: Key type dns_resolver registered May 10 00:45:36.242215 kernel: IPI shorthand broadcast: enabled May 10 00:45:36.242223 kernel: sched_clock: Marking stable (594075376, 174030283)->(1136549161, -368443502) May 10 00:45:36.242230 kernel: registered taskstats version 1 May 10 00:45:36.242238 kernel: Loading compiled-in X.509 certificates May 10 00:45:36.242246 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:45:36.242254 kernel: Key type .fscrypt registered May 10 00:45:36.242262 kernel: Key type fscrypt-provisioning registered May 10 00:45:36.242269 kernel: pstore: Using crash dump compression: deflate May 10 00:45:36.242277 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:45:36.242286 kernel: ima: Allocated hash algorithm: sha1 May 10 00:45:36.242294 kernel: ima: No architecture policies found May 10 00:45:36.242301 kernel: clk: Disabling unused clocks May 10 00:45:36.242310 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:45:36.242317 kernel: Write protecting the kernel read-only data: 28672k May 10 00:45:36.242325 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:45:36.242333 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:45:36.242353 kernel: Run /init as init process May 10 00:45:36.242361 kernel: with arguments: May 10 00:45:36.242371 kernel: /init May 10 00:45:36.242379 kernel: with environment: May 10 00:45:36.242387 kernel: HOME=/ May 10 00:45:36.242394 kernel: TERM=linux May 10 00:45:36.242401 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:45:36.242412 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:45:36.242422 systemd[1]: Detected virtualization kvm. May 10 00:45:36.242430 systemd[1]: Detected architecture x86-64. May 10 00:45:36.242440 systemd[1]: Running in initrd. May 10 00:45:36.242447 systemd[1]: No hostname configured, using default hostname. May 10 00:45:36.242455 systemd[1]: Hostname set to . May 10 00:45:36.242463 systemd[1]: Initializing machine ID from VM UUID. May 10 00:45:36.242471 systemd[1]: Queued start job for default target initrd.target. May 10 00:45:36.242479 systemd[1]: Started systemd-ask-password-console.path. May 10 00:45:36.242487 systemd[1]: Reached target cryptsetup.target. May 10 00:45:36.242495 systemd[1]: Reached target paths.target. May 10 00:45:36.242504 systemd[1]: Reached target slices.target. May 10 00:45:36.242512 systemd[1]: Reached target swap.target. May 10 00:45:36.242519 systemd[1]: Reached target timers.target. May 10 00:45:36.242528 systemd[1]: Listening on iscsid.socket. May 10 00:45:36.242536 systemd[1]: Listening on iscsiuio.socket. May 10 00:45:36.242552 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:45:36.242560 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:45:36.242569 systemd[1]: Listening on systemd-journald.socket. May 10 00:45:36.242579 systemd[1]: Listening on systemd-networkd.socket. May 10 00:45:36.242586 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:45:36.242594 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:45:36.242602 systemd[1]: Reached target sockets.target. May 10 00:45:36.242610 systemd[1]: Starting kmod-static-nodes.service... May 10 00:45:36.242620 systemd[1]: Finished network-cleanup.service. May 10 00:45:36.242759 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:45:36.242769 systemd[1]: Starting systemd-journald.service... May 10 00:45:36.242783 systemd[1]: Starting systemd-modules-load.service... May 10 00:45:36.242796 systemd[1]: Starting systemd-resolved.service... May 10 00:45:36.242806 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:45:36.242815 systemd[1]: Finished kmod-static-nodes.service. May 10 00:45:36.242826 kernel: audit: type=1130 audit(1746837936.224:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.242836 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:45:36.242846 kernel: audit: type=1130 audit(1746837936.229:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.242855 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:45:36.242863 kernel: audit: type=1130 audit(1746837936.235:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.242872 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:45:36.242880 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:45:36.242892 systemd-journald[198]: Journal started May 10 00:45:36.242936 systemd-journald[198]: Runtime Journal (/run/log/journal/a0549909572a49dfbf69e20dcbf03a3d) is 6.0M, max 48.4M, 42.4M free. May 10 00:45:36.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.229858 systemd-modules-load[199]: Inserted module 'overlay' May 10 00:45:36.253130 systemd[1]: Started systemd-journald.service. May 10 00:45:36.253178 kernel: audit: type=1130 audit(1746837936.249:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.253346 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:45:36.256962 kernel: audit: type=1130 audit(1746837936.252:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.260446 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:45:36.266816 kernel: audit: type=1130 audit(1746837936.262:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.266488 systemd[1]: Starting dracut-cmdline.service... May 10 00:45:36.272891 systemd-resolved[200]: Positive Trust Anchors: May 10 00:45:36.273903 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:45:36.272905 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:45:36.272935 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:45:36.281940 dracut-cmdline[217]: dracut-dracut-053 May 10 00:45:36.281940 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:45:36.288451 kernel: Bridge firewalling registered May 10 00:45:36.283522 systemd-modules-load[199]: Inserted module 'br_netfilter' May 10 00:45:36.291833 systemd-resolved[200]: Defaulting to hostname 'linux'. May 10 00:45:36.293744 systemd[1]: Started systemd-resolved.service. May 10 00:45:36.299462 kernel: audit: type=1130 audit(1746837936.293:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.294657 systemd[1]: Reached target nss-lookup.target. May 10 00:45:36.306709 kernel: SCSI subsystem initialized May 10 00:45:36.388265 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:45:36.388355 kernel: device-mapper: uevent: version 1.0.3 May 10 00:45:36.388368 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:45:36.392569 systemd-modules-load[199]: Inserted module 'dm_multipath' May 10 00:45:36.393422 systemd[1]: Finished systemd-modules-load.service. May 10 00:45:36.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.402722 kernel: audit: type=1130 audit(1746837936.398:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.399853 systemd[1]: Starting systemd-sysctl.service... May 10 00:45:36.409517 systemd[1]: Finished systemd-sysctl.service. May 10 00:45:36.414029 kernel: audit: type=1130 audit(1746837936.410:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.470723 kernel: Loading iSCSI transport class v2.0-870. May 10 00:45:36.492726 kernel: iscsi: registered transport (tcp) May 10 00:45:36.535169 kernel: iscsi: registered transport (qla4xxx) May 10 00:45:36.535283 kernel: QLogic iSCSI HBA Driver May 10 00:45:36.574046 systemd[1]: Finished dracut-cmdline.service. May 10 00:45:36.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.593654 systemd[1]: Starting dracut-pre-udev.service... May 10 00:45:36.646723 kernel: raid6: avx2x4 gen() 21937 MB/s May 10 00:45:36.663727 kernel: raid6: avx2x4 xor() 6782 MB/s May 10 00:45:36.680714 kernel: raid6: avx2x2 gen() 23121 MB/s May 10 00:45:36.697733 kernel: raid6: avx2x2 xor() 14008 MB/s May 10 00:45:36.721741 kernel: raid6: avx2x1 gen() 18004 MB/s May 10 00:45:36.738729 kernel: raid6: avx2x1 xor() 10847 MB/s May 10 00:45:36.761715 kernel: raid6: sse2x4 gen() 10489 MB/s May 10 00:45:36.778734 kernel: raid6: sse2x4 xor() 5228 MB/s May 10 00:45:36.795708 kernel: raid6: sse2x2 gen() 11009 MB/s May 10 00:45:36.812705 kernel: raid6: sse2x2 xor() 7167 MB/s May 10 00:45:36.829708 kernel: raid6: sse2x1 gen() 8932 MB/s May 10 00:45:36.847447 kernel: raid6: sse2x1 xor() 5736 MB/s May 10 00:45:36.847548 kernel: raid6: using algorithm avx2x2 gen() 23121 MB/s May 10 00:45:36.847562 kernel: raid6: .... xor() 14008 MB/s, rmw enabled May 10 00:45:36.848318 kernel: raid6: using avx2x2 recovery algorithm May 10 00:45:36.864717 kernel: xor: automatically using best checksumming function avx May 10 00:45:36.969713 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:45:36.979795 systemd[1]: Finished dracut-pre-udev.service. May 10 00:45:36.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.980000 audit: BPF prog-id=7 op=LOAD May 10 00:45:36.980000 audit: BPF prog-id=8 op=LOAD May 10 00:45:36.982137 systemd[1]: Starting systemd-udevd.service... May 10 00:45:36.998742 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 10 00:45:37.003810 systemd[1]: Started systemd-udevd.service. May 10 00:45:37.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:37.009751 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:45:37.020827 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 10 00:45:37.047832 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:45:37.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:37.049779 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:45:37.088813 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:45:37.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:37.137711 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:45:37.160662 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:45:37.160698 kernel: libata version 3.00 loaded. May 10 00:45:37.160714 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:45:37.160726 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:45:37.160739 kernel: GPT:9289727 != 19775487 May 10 00:45:37.160756 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:45:37.160768 kernel: GPT:9289727 != 19775487 May 10 00:45:37.160779 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:45:37.160792 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:45:37.160804 kernel: AES CTR mode by8 optimization enabled May 10 00:45:37.165699 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:45:37.209718 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:45:37.209750 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:45:37.209950 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:45:37.210102 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (444) May 10 00:45:37.210117 kernel: scsi host0: ahci May 10 00:45:37.210256 kernel: scsi host1: ahci May 10 00:45:37.210388 kernel: scsi host2: ahci May 10 00:45:37.210508 kernel: scsi host3: ahci May 10 00:45:37.210637 kernel: scsi host4: ahci May 10 00:45:37.210776 kernel: scsi host5: ahci May 10 00:45:37.210899 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 10 00:45:37.210913 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 10 00:45:37.210925 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 10 00:45:37.210937 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 10 00:45:37.210949 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 10 00:45:37.210961 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 10 00:45:37.182049 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:45:37.186161 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:45:37.188199 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:45:37.196542 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:45:37.198887 systemd[1]: Starting disk-uuid.service... May 10 00:45:37.203375 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:45:37.349445 disk-uuid[526]: Primary Header is updated. May 10 00:45:37.349445 disk-uuid[526]: Secondary Entries is updated. May 10 00:45:37.349445 disk-uuid[526]: Secondary Header is updated. May 10 00:45:37.354555 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:45:37.357711 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:45:37.522840 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:45:37.522926 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:45:37.522937 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:45:37.525037 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:45:37.525119 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:45:37.526736 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:45:37.527713 kernel: ata3.00: applying bridge limits May 10 00:45:37.527740 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:45:37.528718 kernel: ata3.00: configured for UDMA/100 May 10 00:45:37.529903 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:45:37.560950 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:45:37.578613 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:45:37.578633 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:45:38.359714 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:45:38.360103 disk-uuid[539]: The operation has completed successfully. May 10 00:45:38.387446 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:45:38.387562 systemd[1]: Finished disk-uuid.service. May 10 00:45:38.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.398962 systemd[1]: Starting verity-setup.service... May 10 00:45:38.415704 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:45:38.441262 systemd[1]: Found device dev-mapper-usr.device. May 10 00:45:38.443939 systemd[1]: Mounting sysusr-usr.mount... May 10 00:45:38.446598 systemd[1]: Finished verity-setup.service. May 10 00:45:38.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.517701 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:45:38.517685 systemd[1]: Mounted sysusr-usr.mount. May 10 00:45:38.518571 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:45:38.519293 systemd[1]: Starting ignition-setup.service... May 10 00:45:38.522522 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:45:38.530701 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:45:38.530737 kernel: BTRFS info (device vda6): using free space tree May 10 00:45:38.530747 kernel: BTRFS info (device vda6): has skinny extents May 10 00:45:38.538210 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:45:38.547157 systemd[1]: Finished ignition-setup.service. May 10 00:45:38.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.548330 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:45:38.615200 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:45:38.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.616000 audit: BPF prog-id=9 op=LOAD May 10 00:45:38.617931 systemd[1]: Starting systemd-networkd.service... May 10 00:45:38.637614 ignition[637]: Ignition 2.14.0 May 10 00:45:38.637629 ignition[637]: Stage: fetch-offline May 10 00:45:38.637728 ignition[637]: no configs at "/usr/lib/ignition/base.d" May 10 00:45:38.637740 ignition[637]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:38.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.640952 systemd-networkd[717]: lo: Link UP May 10 00:45:38.637904 ignition[637]: parsed url from cmdline: "" May 10 00:45:38.640956 systemd-networkd[717]: lo: Gained carrier May 10 00:45:38.637909 ignition[637]: no config URL provided May 10 00:45:38.641363 systemd-networkd[717]: Enumeration completed May 10 00:45:38.637915 ignition[637]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:45:38.641568 systemd-networkd[717]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:38.637925 ignition[637]: no config at "/usr/lib/ignition/user.ign" May 10 00:45:38.642532 systemd[1]: Started systemd-networkd.service. May 10 00:45:38.637947 ignition[637]: op(1): [started] loading QEMU firmware config module May 10 00:45:38.643833 systemd-networkd[717]: eth0: Link UP May 10 00:45:38.637952 ignition[637]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:45:38.643837 systemd-networkd[717]: eth0: Gained carrier May 10 00:45:38.642938 ignition[637]: op(1): [finished] loading QEMU firmware config module May 10 00:45:38.645628 systemd[1]: Reached target network.target. May 10 00:45:38.645269 ignition[637]: parsing config with SHA512: b55f691e1ea32e30c517cb16568b2a8b24993fa9314fd6a9b9409e529cff1457f1c56e4dbe2028d9ad1d113466a253130e3879275f4fca3fc2205622a6db030a May 10 00:45:38.650311 unknown[637]: fetched base config from "system" May 10 00:45:38.650883 ignition[637]: fetch-offline: fetch-offline passed May 10 00:45:38.650320 unknown[637]: fetched user config from "qemu" May 10 00:45:38.650978 ignition[637]: Ignition finished successfully May 10 00:45:38.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.658671 systemd[1]: Starting iscsiuio.service... May 10 00:45:38.664048 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:45:38.664836 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:45:38.666087 systemd[1]: Starting ignition-kargs.service... May 10 00:45:38.679303 ignition[722]: Ignition 2.14.0 May 10 00:45:38.679314 ignition[722]: Stage: kargs May 10 00:45:38.679421 ignition[722]: no configs at "/usr/lib/ignition/base.d" May 10 00:45:38.679431 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:38.683394 ignition[722]: kargs: kargs passed May 10 00:45:38.683462 ignition[722]: Ignition finished successfully May 10 00:45:38.687091 systemd[1]: Finished ignition-kargs.service. May 10 00:45:38.687825 systemd-networkd[717]: eth0: DHCPv4 address 10.0.0.129/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:45:38.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.691542 systemd[1]: Starting ignition-disks.service... May 10 00:45:38.696889 systemd[1]: Started iscsiuio.service. May 10 00:45:38.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.699266 systemd[1]: Starting iscsid.service... May 10 00:45:38.702457 iscsid[735]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:45:38.702457 iscsid[735]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:45:38.702457 iscsid[735]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:45:38.702457 iscsid[735]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:45:38.702457 iscsid[735]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:45:38.702457 iscsid[735]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:45:38.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.705822 systemd[1]: Started iscsid.service. May 10 00:45:38.706645 ignition[728]: Ignition 2.14.0 May 10 00:45:38.710395 systemd[1]: Finished ignition-disks.service. May 10 00:45:38.706651 ignition[728]: Stage: disks May 10 00:45:38.712098 systemd[1]: Reached target initrd-root-device.target. May 10 00:45:38.706811 ignition[728]: no configs at "/usr/lib/ignition/base.d" May 10 00:45:38.714205 systemd[1]: Reached target local-fs-pre.target. May 10 00:45:38.706822 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:38.716629 systemd[1]: Reached target local-fs.target. May 10 00:45:38.707912 ignition[728]: disks: disks passed May 10 00:45:38.719143 systemd[1]: Reached target sysinit.target. May 10 00:45:38.707962 ignition[728]: Ignition finished successfully May 10 00:45:38.720082 systemd[1]: Reached target basic.target. May 10 00:45:38.722001 systemd[1]: Starting dracut-initqueue.service... May 10 00:45:38.735435 systemd[1]: Finished dracut-initqueue.service. May 10 00:45:38.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.736412 systemd[1]: Reached target remote-fs-pre.target. May 10 00:45:38.738434 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:45:38.739535 systemd[1]: Reached target remote-fs.target. May 10 00:45:38.741391 systemd[1]: Starting dracut-pre-mount.service... May 10 00:45:38.751072 systemd[1]: Finished dracut-pre-mount.service. May 10 00:45:38.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.753327 systemd[1]: Starting systemd-fsck-root.service... May 10 00:45:38.769068 systemd-fsck[751]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:45:38.775169 systemd[1]: Finished systemd-fsck-root.service. May 10 00:45:38.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.778473 systemd[1]: Mounting sysroot.mount... May 10 00:45:38.788703 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:45:38.789128 systemd[1]: Mounted sysroot.mount. May 10 00:45:38.790662 systemd[1]: Reached target initrd-root-fs.target. May 10 00:45:38.793556 systemd[1]: Mounting sysroot-usr.mount... May 10 00:45:38.795553 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:45:38.795612 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:45:38.797057 systemd[1]: Reached target ignition-diskful.target. May 10 00:45:38.801702 systemd[1]: Mounted sysroot-usr.mount. May 10 00:45:38.804497 systemd[1]: Starting initrd-setup-root.service... May 10 00:45:38.809271 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:45:38.813105 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory May 10 00:45:38.816913 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:45:38.820908 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:45:38.879098 systemd[1]: Finished initrd-setup-root.service. May 10 00:45:38.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.882414 systemd[1]: Starting ignition-mount.service... May 10 00:45:38.885257 systemd[1]: Starting sysroot-boot.service... May 10 00:45:38.889727 bash[802]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:45:38.898534 ignition[804]: INFO : Ignition 2.14.0 May 10 00:45:38.899637 ignition[804]: INFO : Stage: mount May 10 00:45:38.900706 ignition[804]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:45:38.902729 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:38.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.901240 systemd[1]: Finished sysroot-boot.service. May 10 00:45:38.904991 ignition[804]: INFO : mount: mount passed May 10 00:45:38.904991 ignition[804]: INFO : Ignition finished successfully May 10 00:45:38.906455 systemd[1]: Finished ignition-mount.service. May 10 00:45:38.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:38.989274 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.129 May 10 00:45:38.989295 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. May 10 00:45:39.454853 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:45:39.463714 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (813) May 10 00:45:39.463750 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:45:39.465188 kernel: BTRFS info (device vda6): using free space tree May 10 00:45:39.465211 kernel: BTRFS info (device vda6): has skinny extents May 10 00:45:39.470344 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:45:39.471666 systemd[1]: Starting ignition-files.service... May 10 00:45:39.486695 ignition[833]: INFO : Ignition 2.14.0 May 10 00:45:39.486695 ignition[833]: INFO : Stage: files May 10 00:45:39.489183 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:45:39.489183 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:39.489183 ignition[833]: DEBUG : files: compiled without relabeling support, skipping May 10 00:45:39.493308 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:45:39.493308 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:45:39.493308 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:45:39.493308 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:45:39.493308 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:45:39.493308 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 10 00:45:39.493308 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:45:39.493308 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:45:39.493308 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:45:39.493308 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:45:39.492375 unknown[833]: wrote ssh authorized keys file for user: core May 10 00:45:39.512590 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:45:39.512590 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:45:39.512590 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 00:45:39.868317 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 10 00:45:40.446895 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:45:40.446895 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 10 00:45:40.458128 ignition[833]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:45:40.458128 ignition[833]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:45:40.458128 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 10 00:45:40.458128 ignition[833]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:45:40.458128 ignition[833]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:45:40.490315 ignition[833]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:45:40.494928 ignition[833]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:45:40.494928 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:45:40.494928 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:45:40.494928 ignition[833]: INFO : files: files passed May 10 00:45:40.494928 ignition[833]: INFO : Ignition finished successfully May 10 00:45:40.502306 systemd[1]: Finished ignition-files.service. May 10 00:45:40.508799 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:45:40.508825 kernel: audit: type=1130 audit(1746837940.503:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.504296 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:45:40.508796 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:45:40.544053 initrd-setup-root-after-ignition[857]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:45:40.549597 kernel: audit: type=1130 audit(1746837940.543:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.509641 systemd[1]: Starting ignition-quench.service... May 10 00:45:40.583207 kernel: audit: type=1130 audit(1746837940.548:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.583237 kernel: audit: type=1131 audit(1746837940.548:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.583407 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:45:40.511343 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:45:40.544298 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:45:40.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.544386 systemd[1]: Finished ignition-quench.service. May 10 00:45:40.615219 kernel: audit: type=1130 audit(1746837940.606:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.615240 kernel: audit: type=1131 audit(1746837940.606:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.549755 systemd[1]: Reached target ignition-complete.target. May 10 00:45:40.584284 systemd[1]: Starting initrd-parse-etc.service... May 10 00:45:40.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.587826 systemd-networkd[717]: eth0: Gained IPv6LL May 10 00:45:40.648620 kernel: audit: type=1130 audit(1746837940.643:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.597536 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:45:40.597624 systemd[1]: Finished initrd-parse-etc.service. May 10 00:45:40.721403 kernel: audit: type=1131 audit(1746837940.670:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.721452 kernel: audit: type=1131 audit(1746837940.675:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.721463 kernel: audit: type=1131 audit(1746837940.681:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.721801 iscsid[735]: iscsid shutting down. May 10 00:45:40.606984 systemd[1]: Reached target initrd-fs.target. May 10 00:45:40.613723 systemd[1]: Reached target initrd.target. May 10 00:45:40.615253 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:45:40.616074 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:45:40.625745 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:45:40.644452 systemd[1]: Starting initrd-cleanup.service... May 10 00:45:40.653707 systemd[1]: Stopped target nss-lookup.target. May 10 00:45:40.671070 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:45:40.671260 systemd[1]: Stopped target timers.target. May 10 00:45:40.671449 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:45:40.671601 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:45:40.672184 systemd[1]: Stopped target initrd.target. May 10 00:45:40.675773 systemd[1]: Stopped target basic.target. May 10 00:45:40.675947 systemd[1]: Stopped target ignition-complete.target. May 10 00:45:40.676129 systemd[1]: Stopped target ignition-diskful.target. May 10 00:45:40.676316 systemd[1]: Stopped target initrd-root-device.target. May 10 00:45:40.676579 systemd[1]: Stopped target remote-fs.target. May 10 00:45:40.676753 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:45:40.676952 systemd[1]: Stopped target sysinit.target. May 10 00:45:40.677165 systemd[1]: Stopped target local-fs.target. May 10 00:45:40.677353 systemd[1]: Stopped target local-fs-pre.target. May 10 00:45:40.677570 systemd[1]: Stopped target swap.target. May 10 00:45:40.677958 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:45:40.678050 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:45:40.678248 systemd[1]: Stopped target cryptsetup.target. May 10 00:45:40.681953 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:45:40.682044 systemd[1]: Stopped dracut-initqueue.service. May 10 00:45:40.682205 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:45:40.682294 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:45:40.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.685797 systemd[1]: Stopped target paths.target. May 10 00:45:40.685878 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:45:40.693738 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:45:40.704570 systemd[1]: Stopped target slices.target. May 10 00:45:40.705033 systemd[1]: Stopped target sockets.target. May 10 00:45:40.705214 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:45:40.705371 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:45:40.706081 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:45:40.769978 ignition[874]: INFO : Ignition 2.14.0 May 10 00:45:40.769978 ignition[874]: INFO : Stage: umount May 10 00:45:40.769978 ignition[874]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:45:40.769978 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:45:40.769978 ignition[874]: INFO : umount: umount passed May 10 00:45:40.769978 ignition[874]: INFO : Ignition finished successfully May 10 00:45:40.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.706213 systemd[1]: Stopped ignition-files.service. May 10 00:45:40.707769 systemd[1]: Stopping ignition-mount.service... May 10 00:45:40.708321 systemd[1]: Stopping iscsid.service... May 10 00:45:40.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.708580 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:45:40.708761 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:45:40.710284 systemd[1]: Stopping sysroot-boot.service... May 10 00:45:40.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.710585 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:45:40.794000 audit: BPF prog-id=6 op=UNLOAD May 10 00:45:40.710840 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:45:40.711322 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:45:40.711531 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:45:40.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.714595 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:45:40.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.714768 systemd[1]: Stopped iscsid.service. May 10 00:45:40.716605 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:45:40.716717 systemd[1]: Finished initrd-cleanup.service. May 10 00:45:40.718108 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:45:40.718157 systemd[1]: Closed iscsid.socket. May 10 00:45:40.722085 systemd[1]: Stopping iscsiuio.service... May 10 00:45:40.723738 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:45:40.723857 systemd[1]: Stopped iscsiuio.service. May 10 00:45:40.725305 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:45:40.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.725346 systemd[1]: Closed iscsiuio.socket. May 10 00:45:40.730388 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:45:40.770283 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.770406 systemd[1]: Stopped ignition-mount.service. May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.772335 systemd[1]: Stopped target network.target. May 10 00:45:40.774218 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:45:40.774275 systemd[1]: Stopped ignition-disks.service. May 10 00:45:40.776748 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:45:40.776786 systemd[1]: Stopped ignition-kargs.service. May 10 00:45:40.779336 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:45:40.779384 systemd[1]: Stopped ignition-setup.service. May 10 00:45:40.781567 systemd[1]: Stopping systemd-networkd.service... May 10 00:45:40.784088 systemd[1]: Stopping systemd-resolved.service... May 10 00:45:40.784778 systemd-networkd[717]: eth0: DHCPv6 lease lost May 10 00:45:40.886000 audit: BPF prog-id=9 op=UNLOAD May 10 00:45:40.786195 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:45:40.786310 systemd[1]: Stopped systemd-networkd.service. May 10 00:45:40.792023 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:45:40.792131 systemd[1]: Stopped systemd-resolved.service. May 10 00:45:40.794834 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:45:40.794871 systemd[1]: Closed systemd-networkd.socket. May 10 00:45:40.798305 systemd[1]: Stopping network-cleanup.service... May 10 00:45:40.799279 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:45:40.799347 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:45:40.801761 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:45:40.801816 systemd[1]: Stopped systemd-sysctl.service. May 10 00:45:40.805063 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:45:40.805106 systemd[1]: Stopped systemd-modules-load.service. May 10 00:45:40.806855 systemd[1]: Stopping systemd-udevd.service... May 10 00:45:40.811488 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:45:40.815931 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:45:40.909426 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). May 10 00:45:40.816054 systemd[1]: Stopped network-cleanup.service. May 10 00:45:40.818278 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:45:40.818383 systemd[1]: Stopped systemd-udevd.service. May 10 00:45:40.820554 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:45:40.820587 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:45:40.822517 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:45:40.822550 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:45:40.824810 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:45:40.824860 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:45:40.827058 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:45:40.827095 systemd[1]: Stopped dracut-cmdline.service. May 10 00:45:40.827195 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:45:40.827226 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:45:40.828180 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:45:40.828460 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:45:40.828510 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:45:40.829017 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:45:40.829098 systemd[1]: Stopped sysroot-boot.service. May 10 00:45:40.829355 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:45:40.829386 systemd[1]: Stopped initrd-setup-root.service. May 10 00:45:40.835306 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:45:40.835389 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:45:40.862276 systemd[1]: Reached target initrd-switch-root.target. May 10 00:45:40.864229 systemd[1]: Starting initrd-switch-root.service... May 10 00:45:40.888493 systemd[1]: Switching root. May 10 00:45:40.919835 systemd-journald[198]: Journal stopped May 10 00:45:45.433832 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:45:45.433884 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:45:45.433897 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:45:45.433910 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:45:45.433919 kernel: SELinux: policy capability open_perms=1 May 10 00:45:45.433933 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:45:45.433946 kernel: SELinux: policy capability always_check_network=0 May 10 00:45:45.433957 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:45:45.433967 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:45:45.433976 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:45:45.433986 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:45:45.433998 systemd[1]: Successfully loaded SELinux policy in 59.207ms. May 10 00:45:45.434023 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.271ms. May 10 00:45:45.434038 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:45:45.434049 systemd[1]: Detected virtualization kvm. May 10 00:45:45.434060 systemd[1]: Detected architecture x86-64. May 10 00:45:45.434070 systemd[1]: Detected first boot. May 10 00:45:45.434083 systemd[1]: Initializing machine ID from VM UUID. May 10 00:45:45.434095 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:45:45.434108 systemd[1]: Populated /etc with preset unit settings. May 10 00:45:45.434119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:45.434133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:45.434144 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:45.434155 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:45:45.434165 systemd[1]: Stopped initrd-switch-root.service. May 10 00:45:45.434176 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:45:45.434186 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:45:45.434198 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:45:45.434210 systemd[1]: Created slice system-getty.slice. May 10 00:45:45.434220 systemd[1]: Created slice system-modprobe.slice. May 10 00:45:45.434230 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:45:45.434241 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:45:45.434251 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:45:45.434261 systemd[1]: Created slice user.slice. May 10 00:45:45.434272 systemd[1]: Started systemd-ask-password-console.path. May 10 00:45:45.434282 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:45:45.434297 systemd[1]: Set up automount boot.automount. May 10 00:45:45.434311 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:45:45.434335 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:45:45.434349 systemd[1]: Stopped target initrd-fs.target. May 10 00:45:45.434360 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:45:45.434372 systemd[1]: Reached target integritysetup.target. May 10 00:45:45.434383 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:45:45.434393 systemd[1]: Reached target remote-fs.target. May 10 00:45:45.434404 systemd[1]: Reached target slices.target. May 10 00:45:45.434414 systemd[1]: Reached target swap.target. May 10 00:45:45.434424 systemd[1]: Reached target torcx.target. May 10 00:45:45.434434 systemd[1]: Reached target veritysetup.target. May 10 00:45:45.434445 systemd[1]: Listening on systemd-coredump.socket. May 10 00:45:45.434458 systemd[1]: Listening on systemd-initctl.socket. May 10 00:45:45.434468 systemd[1]: Listening on systemd-networkd.socket. May 10 00:45:45.434478 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:45:45.434488 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:45:45.434499 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:45:45.434509 systemd[1]: Mounting dev-hugepages.mount... May 10 00:45:45.434519 systemd[1]: Mounting dev-mqueue.mount... May 10 00:45:45.434530 systemd[1]: Mounting media.mount... May 10 00:45:45.434540 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:45.434551 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:45:45.434563 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:45:45.434574 systemd[1]: Mounting tmp.mount... May 10 00:45:45.434585 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:45:45.434596 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:45.434606 systemd[1]: Starting kmod-static-nodes.service... May 10 00:45:45.434616 systemd[1]: Starting modprobe@configfs.service... May 10 00:45:45.434626 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:45.434636 systemd[1]: Starting modprobe@drm.service... May 10 00:45:45.434646 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:45.434658 systemd[1]: Starting modprobe@fuse.service... May 10 00:45:45.434668 systemd[1]: Starting modprobe@loop.service... May 10 00:45:45.434694 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:45:45.434705 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:45:45.434715 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:45:45.434725 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:45:45.434735 kernel: loop: module loaded May 10 00:45:45.434745 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:45:45.434756 systemd[1]: Stopped systemd-journald.service. May 10 00:45:45.434768 kernel: fuse: init (API version 7.34) May 10 00:45:45.434778 systemd[1]: Starting systemd-journald.service... May 10 00:45:45.434788 systemd[1]: Starting systemd-modules-load.service... May 10 00:45:45.434799 systemd[1]: Starting systemd-network-generator.service... May 10 00:45:45.434810 systemd[1]: Starting systemd-remount-fs.service... May 10 00:45:45.434821 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:45:45.434831 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:45:45.434844 systemd-journald[989]: Journal started May 10 00:45:45.434886 systemd-journald[989]: Runtime Journal (/run/log/journal/a0549909572a49dfbf69e20dcbf03a3d) is 6.0M, max 48.4M, 42.4M free. May 10 00:45:40.995000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:45:41.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:41.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:41.663000 audit: BPF prog-id=10 op=LOAD May 10 00:45:41.663000 audit: BPF prog-id=10 op=UNLOAD May 10 00:45:41.663000 audit: BPF prog-id=11 op=LOAD May 10 00:45:41.663000 audit: BPF prog-id=11 op=UNLOAD May 10 00:45:41.699000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:45:41.699000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.699000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:45:41.701000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:45:41.701000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.701000 audit: CWD cwd="/" May 10 00:45:41.701000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:41.701000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:41.701000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:45:45.241000 audit: BPF prog-id=12 op=LOAD May 10 00:45:45.241000 audit: BPF prog-id=3 op=UNLOAD May 10 00:45:45.241000 audit: BPF prog-id=13 op=LOAD May 10 00:45:45.241000 audit: BPF prog-id=14 op=LOAD May 10 00:45:45.241000 audit: BPF prog-id=4 op=UNLOAD May 10 00:45:45.241000 audit: BPF prog-id=5 op=UNLOAD May 10 00:45:45.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.262000 audit: BPF prog-id=12 op=UNLOAD May 10 00:45:45.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.415000 audit: BPF prog-id=15 op=LOAD May 10 00:45:45.415000 audit: BPF prog-id=16 op=LOAD May 10 00:45:45.416000 audit: BPF prog-id=17 op=LOAD May 10 00:45:45.416000 audit: BPF prog-id=13 op=UNLOAD May 10 00:45:45.416000 audit: BPF prog-id=14 op=UNLOAD May 10 00:45:45.432000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:45:45.432000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe965366b0 a2=4000 a3=7ffe9653674c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:45.432000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:45:41.698361 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:45.240093 systemd[1]: Queued start job for default target multi-user.target. May 10 00:45:41.698601 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:45:45.240105 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:45:41.698694 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:45:45.243107 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:45:41.698726 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:45:41.698736 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:45:41.698763 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:45:41.698775 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:45:41.699002 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:45:41.699044 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:45:41.699056 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:45:41.700058 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:45:41.700112 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:45:41.700138 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:45:41.700156 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:45:41.700180 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:45:41.700196 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:45:44.949610 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:44.949960 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:44.950079 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:44.950299 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:44.950375 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:45:44.950451 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-10T00:45:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:45:45.458708 systemd[1]: Stopped verity-setup.service. May 10 00:45:45.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.461709 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:45.465757 systemd[1]: Started systemd-journald.service. May 10 00:45:45.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.466362 systemd[1]: Mounted dev-hugepages.mount. May 10 00:45:45.467262 systemd[1]: Mounted dev-mqueue.mount. May 10 00:45:45.468132 systemd[1]: Mounted media.mount. May 10 00:45:45.468944 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:45:45.469867 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:45:45.470805 systemd[1]: Mounted tmp.mount. May 10 00:45:45.471855 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:45:45.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.473080 systemd[1]: Finished kmod-static-nodes.service. May 10 00:45:45.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.474187 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:45:45.474434 systemd[1]: Finished modprobe@configfs.service. May 10 00:45:45.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.475589 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:45.475780 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:45.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.476985 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:45:45.477197 systemd[1]: Finished modprobe@drm.service. May 10 00:45:45.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.511198 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:45.511462 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:45.511729 kernel: kauditd_printk_skb: 77 callbacks suppressed May 10 00:45:45.511770 kernel: audit: type=1130 audit(1746837945.510:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.515707 kernel: audit: type=1131 audit(1746837945.510:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.519222 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:45:45.519387 systemd[1]: Finished modprobe@fuse.service. May 10 00:45:45.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.522809 kernel: audit: type=1130 audit(1746837945.518:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.522841 kernel: audit: type=1131 audit(1746837945.518:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.527805 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:45.528061 systemd[1]: Finished modprobe@loop.service. May 10 00:45:45.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.542716 kernel: audit: type=1130 audit(1746837945.526:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.542822 kernel: audit: type=1131 audit(1746837945.526:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.547779 systemd[1]: Finished systemd-modules-load.service. May 10 00:45:45.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.551713 kernel: audit: type=1130 audit(1746837945.546:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.551769 kernel: audit: type=1131 audit(1746837945.546:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.556001 systemd[1]: Finished systemd-network-generator.service. May 10 00:45:45.559706 kernel: audit: type=1130 audit(1746837945.554:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.560643 systemd[1]: Finished systemd-remount-fs.service. May 10 00:45:45.564788 kernel: audit: type=1130 audit(1746837945.559:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.565337 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:45:45.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.566967 systemd[1]: Reached target network-pre.target. May 10 00:45:45.569270 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:45:45.571279 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:45:45.572145 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:45:45.573757 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:45:45.575691 systemd[1]: Starting systemd-journal-flush.service... May 10 00:45:45.576689 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:45.577541 systemd[1]: Starting systemd-random-seed.service... May 10 00:45:45.578456 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:45.581338 systemd-journald[989]: Time spent on flushing to /var/log/journal/a0549909572a49dfbf69e20dcbf03a3d is 13.766ms for 1153 entries. May 10 00:45:45.581338 systemd-journald[989]: System Journal (/var/log/journal/a0549909572a49dfbf69e20dcbf03a3d) is 8.0M, max 195.6M, 187.6M free. May 10 00:45:46.235699 systemd-journald[989]: Received client request to flush runtime journal. May 10 00:45:45.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.579690 systemd[1]: Starting systemd-sysctl.service... May 10 00:45:45.581847 systemd[1]: Starting systemd-sysusers.service... May 10 00:45:45.596005 systemd[1]: Starting systemd-udev-settle.service... May 10 00:45:46.236774 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:45:45.598908 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:45:45.600082 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:45:45.681310 systemd[1]: Finished systemd-sysctl.service. May 10 00:45:45.701369 systemd[1]: Finished systemd-sysusers.service. May 10 00:45:45.871572 systemd[1]: Finished systemd-random-seed.service. May 10 00:45:45.872721 systemd[1]: Reached target first-boot-complete.target. May 10 00:45:46.237030 systemd[1]: Finished systemd-journal-flush.service. May 10 00:45:46.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.685773 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:45:46.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.686000 audit: BPF prog-id=18 op=LOAD May 10 00:45:46.686000 audit: BPF prog-id=19 op=LOAD May 10 00:45:46.686000 audit: BPF prog-id=7 op=UNLOAD May 10 00:45:46.687000 audit: BPF prog-id=8 op=UNLOAD May 10 00:45:46.688197 systemd[1]: Starting systemd-udevd.service... May 10 00:45:46.704074 systemd-udevd[1014]: Using default interface naming scheme 'v252'. May 10 00:45:46.721120 systemd[1]: Started systemd-udevd.service. May 10 00:45:46.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.722000 audit: BPF prog-id=20 op=LOAD May 10 00:45:46.725515 systemd[1]: Starting systemd-networkd.service... May 10 00:45:46.732000 audit: BPF prog-id=21 op=LOAD May 10 00:45:46.732000 audit: BPF prog-id=22 op=LOAD May 10 00:45:46.732000 audit: BPF prog-id=23 op=LOAD May 10 00:45:46.734388 systemd[1]: Starting systemd-userdbd.service... May 10 00:45:46.763155 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:45:46.772735 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:45:46.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.806431 systemd[1]: Started systemd-userdbd.service. May 10 00:45:46.821699 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:45:46.883717 kernel: ACPI: button: Power Button [PWRF] May 10 00:45:46.833000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:45:46.833000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564289da5390 a1=338ac a2=7fcfd83abbc5 a3=5 items=110 ppid=1014 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.833000 audit: CWD cwd="/" May 10 00:45:46.833000 audit: PATH item=0 name=(null) inode=47 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=1 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=2 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=3 name=(null) inode=12940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=4 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=5 name=(null) inode=12941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=6 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=7 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=8 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=9 name=(null) inode=12943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=10 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=11 name=(null) inode=12944 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=12 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=13 name=(null) inode=12945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=14 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=15 name=(null) inode=12946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=16 name=(null) inode=12942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=17 name=(null) inode=12947 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=18 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=19 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=20 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=21 name=(null) inode=12949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=22 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=23 name=(null) inode=12950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=24 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=25 name=(null) inode=12951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=26 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=27 name=(null) inode=12952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=28 name=(null) inode=12948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=29 name=(null) inode=12953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=30 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=31 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=32 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=33 name=(null) inode=12955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=34 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=35 name=(null) inode=12956 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=36 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=37 name=(null) inode=12957 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=38 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=39 name=(null) inode=12958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=40 name=(null) inode=12954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=41 name=(null) inode=12959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=42 name=(null) inode=12939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=43 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=44 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=45 name=(null) inode=12961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=46 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=47 name=(null) inode=12962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=48 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=49 name=(null) inode=12963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=50 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=51 name=(null) inode=12964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=52 name=(null) inode=12960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=53 name=(null) inode=12965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=54 name=(null) inode=47 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=55 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=56 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=57 name=(null) inode=12967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=58 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=59 name=(null) inode=12968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=60 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=61 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=62 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=63 name=(null) inode=12970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=64 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=65 name=(null) inode=12971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=66 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=67 name=(null) inode=12972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=68 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=69 name=(null) inode=12973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=70 name=(null) inode=12969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=71 name=(null) inode=12974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=72 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=73 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=74 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=75 name=(null) inode=12976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=76 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=77 name=(null) inode=12977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=78 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=79 name=(null) inode=12978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=80 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=81 name=(null) inode=12979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=82 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=83 name=(null) inode=12980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=84 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=85 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=86 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=87 name=(null) inode=12982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=88 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=89 name=(null) inode=12983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=90 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=91 name=(null) inode=12984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=92 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=93 name=(null) inode=12985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=94 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=95 name=(null) inode=12986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=96 name=(null) inode=12966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=97 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=98 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=99 name=(null) inode=12988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=100 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=101 name=(null) inode=12989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=102 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=103 name=(null) inode=12990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=104 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=105 name=(null) inode=12991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=106 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=107 name=(null) inode=12992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PATH item=109 name=(null) inode=12993 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:46.833000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:45:46.921847 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 10 00:45:46.922397 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:45:46.922582 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:45:46.922883 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:45:46.928716 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:45:46.931702 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:45:46.934064 systemd-networkd[1024]: lo: Link UP May 10 00:45:46.934078 systemd-networkd[1024]: lo: Gained carrier May 10 00:45:46.934476 systemd-networkd[1024]: Enumeration completed May 10 00:45:46.934575 systemd[1]: Started systemd-networkd.service. May 10 00:45:46.935896 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:46.937200 systemd-networkd[1024]: eth0: Link UP May 10 00:45:46.937210 systemd-networkd[1024]: eth0: Gained carrier May 10 00:45:46.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.967928 systemd-networkd[1024]: eth0: DHCPv4 address 10.0.0.129/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:45:46.975095 kernel: kvm: Nested Virtualization enabled May 10 00:45:46.975178 kernel: SVM: kvm: Nested Paging enabled May 10 00:45:46.975193 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:45:46.975223 kernel: SVM: Virtual GIF supported May 10 00:45:47.002722 kernel: EDAC MC: Ver: 3.0.0 May 10 00:45:47.028183 systemd[1]: Finished systemd-udev-settle.service. May 10 00:45:47.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.077587 systemd[1]: Starting lvm2-activation-early.service... May 10 00:45:47.086508 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:47.110773 systemd[1]: Finished lvm2-activation-early.service. May 10 00:45:47.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.111938 systemd[1]: Reached target cryptsetup.target. May 10 00:45:47.114014 systemd[1]: Starting lvm2-activation.service... May 10 00:45:47.118380 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:47.145927 systemd[1]: Finished lvm2-activation.service. May 10 00:45:47.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.150491 systemd[1]: Reached target local-fs-pre.target. May 10 00:45:47.151573 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:45:47.151606 systemd[1]: Reached target local-fs.target. May 10 00:45:47.152585 systemd[1]: Reached target machines.target. May 10 00:45:47.154804 systemd[1]: Starting ldconfig.service... May 10 00:45:47.156043 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:47.156129 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:47.157225 systemd[1]: Starting systemd-boot-update.service... May 10 00:45:47.159469 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:45:47.162345 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:45:47.164751 systemd[1]: Starting systemd-sysext.service... May 10 00:45:47.165890 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1054 (bootctl) May 10 00:45:47.167485 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:45:47.176593 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:45:47.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.183023 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:45:47.217051 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:45:47.217276 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:45:47.227725 kernel: loop0: detected capacity change from 0 to 205544 May 10 00:45:47.241148 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) May 10 00:45:47.241148 systemd-fsck[1062]: /dev/vda1: 791 files, 120708/258078 clusters May 10 00:45:47.243448 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:45:47.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.277716 systemd[1]: Mounting boot.mount... May 10 00:45:47.946426 systemd[1]: Mounted boot.mount. May 10 00:45:47.951697 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:45:47.958101 systemd[1]: Finished systemd-boot-update.service. May 10 00:45:47.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:47.995722 kernel: loop1: detected capacity change from 0 to 205544 May 10 00:45:47.999953 (sd-sysext)[1067]: Using extensions 'kubernetes'. May 10 00:45:48.001191 (sd-sysext)[1067]: Merged extensions into '/usr'. May 10 00:45:48.017737 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.019385 systemd[1]: Mounting usr-share-oem.mount... May 10 00:45:48.045503 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:48.047019 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:48.048956 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:48.051109 systemd[1]: Starting modprobe@loop.service... May 10 00:45:48.052164 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:48.052342 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:48.052513 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.055308 systemd[1]: Mounted usr-share-oem.mount. May 10 00:45:48.056396 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:48.056512 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:48.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.057851 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:48.057961 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:48.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.059165 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:48.059275 systemd[1]: Finished modprobe@loop.service. May 10 00:45:48.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.060425 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:48.060513 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:48.061515 systemd[1]: Finished systemd-sysext.service. May 10 00:45:48.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.063749 systemd[1]: Starting ensure-sysext.service... May 10 00:45:48.065733 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:45:48.070431 systemd[1]: Reloading. May 10 00:45:48.082213 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:45:48.085232 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:45:48.088880 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:45:48.112642 ldconfig[1053]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:45:48.120616 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-05-10T00:45:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:48.120652 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-05-10T00:45:48Z" level=info msg="torcx already run" May 10 00:45:48.361343 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:48.361360 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:48.378919 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:48.440000 audit: BPF prog-id=24 op=LOAD May 10 00:45:48.440000 audit: BPF prog-id=21 op=UNLOAD May 10 00:45:48.440000 audit: BPF prog-id=25 op=LOAD May 10 00:45:48.440000 audit: BPF prog-id=26 op=LOAD May 10 00:45:48.440000 audit: BPF prog-id=22 op=UNLOAD May 10 00:45:48.440000 audit: BPF prog-id=23 op=UNLOAD May 10 00:45:48.440000 audit: BPF prog-id=27 op=LOAD May 10 00:45:48.440000 audit: BPF prog-id=28 op=LOAD May 10 00:45:48.440000 audit: BPF prog-id=18 op=UNLOAD May 10 00:45:48.440000 audit: BPF prog-id=19 op=UNLOAD May 10 00:45:48.441000 audit: BPF prog-id=29 op=LOAD May 10 00:45:48.441000 audit: BPF prog-id=15 op=UNLOAD May 10 00:45:48.442000 audit: BPF prog-id=30 op=LOAD May 10 00:45:48.442000 audit: BPF prog-id=31 op=LOAD May 10 00:45:48.442000 audit: BPF prog-id=16 op=UNLOAD May 10 00:45:48.442000 audit: BPF prog-id=17 op=UNLOAD May 10 00:45:48.443000 audit: BPF prog-id=32 op=LOAD May 10 00:45:48.443000 audit: BPF prog-id=20 op=UNLOAD May 10 00:45:48.447243 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:45:48.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.459390 systemd[1]: Starting audit-rules.service... May 10 00:45:48.462142 systemd[1]: Starting clean-ca-certificates.service... May 10 00:45:48.464815 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:45:48.466000 audit: BPF prog-id=33 op=LOAD May 10 00:45:48.469000 audit: BPF prog-id=34 op=LOAD May 10 00:45:48.467879 systemd[1]: Starting systemd-resolved.service... May 10 00:45:48.471041 systemd[1]: Starting systemd-timesyncd.service... May 10 00:45:48.503997 systemd[1]: Starting systemd-update-utmp.service... May 10 00:45:48.505534 systemd[1]: Finished clean-ca-certificates.service. May 10 00:45:48.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.508000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:45:48.508719 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:48.513692 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.513953 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:48.515753 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:48.518276 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:48.521128 systemd[1]: Starting modprobe@loop.service... May 10 00:45:48.526005 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:48.526345 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:48.526546 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:48.526658 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.528287 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:45:48.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.530119 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:48.530304 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:48.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.531741 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:48.531901 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:48.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.533457 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:48.533565 systemd[1]: Finished modprobe@loop.service. May 10 00:45:48.534986 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:48.535109 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:48.536353 systemd[1]: Finished systemd-update-utmp.service. May 10 00:45:48.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.589555 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.590037 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:48.591616 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:48.593623 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:48.595534 systemd[1]: Starting modprobe@loop.service... May 10 00:45:48.596354 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:48.596500 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:48.596689 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:48.596805 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.598061 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:48.598231 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:48.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.599487 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:48.599599 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:48.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.600866 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:48.600975 systemd[1]: Finished modprobe@loop.service. May 10 00:45:48.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.604550 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.604978 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:48.606589 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:48.608602 systemd[1]: Starting modprobe@drm.service... May 10 00:45:48.610950 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:48.612827 systemd[1]: Starting modprobe@loop.service... May 10 00:45:48.613623 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:48.613775 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:48.615079 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:45:48.616116 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:48.616277 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:48.617792 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:48.617928 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:48.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.619176 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:45:48.619297 systemd[1]: Finished modprobe@drm.service. May 10 00:45:48.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.620530 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:48.620673 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:48.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.649931 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:48.650125 systemd[1]: Finished modprobe@loop.service. May 10 00:45:48.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.651930 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:48.652035 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:48.653549 systemd[1]: Finished ensure-sysext.service. May 10 00:45:48.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.725856 systemd[1]: Started systemd-timesyncd.service. May 10 00:45:48.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.727218 systemd[1]: Reached target time-set.target. May 10 00:45:48.727398 systemd-resolved[1138]: Positive Trust Anchors: May 10 00:45:48.727418 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:45:48.727446 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:45:49.719109 systemd-timesyncd[1139]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:45:49.719000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:45:49.719000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdae0a6150 a2=420 a3=0 items=0 ppid=1135 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.719000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:45:49.720384 augenrules[1166]: No rules May 10 00:45:49.719160 systemd-timesyncd[1139]: Initial clock synchronization to Sat 2025-05-10 00:45:49.719004 UTC. May 10 00:45:49.720864 systemd[1]: Finished audit-rules.service. May 10 00:45:49.727294 systemd-resolved[1138]: Defaulting to hostname 'linux'. May 10 00:45:49.729142 systemd[1]: Started systemd-resolved.service. May 10 00:45:49.766180 systemd[1]: Reached target network.target. May 10 00:45:49.767102 systemd[1]: Reached target nss-lookup.target. May 10 00:45:49.898276 systemd-networkd[1024]: eth0: Gained IPv6LL May 10 00:45:49.899999 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:45:49.903294 systemd[1]: Reached target network-online.target. May 10 00:45:50.132763 systemd[1]: Finished ldconfig.service. May 10 00:45:50.135063 systemd[1]: Starting systemd-update-done.service... May 10 00:45:50.141862 systemd[1]: Finished systemd-update-done.service. May 10 00:45:50.168135 systemd[1]: Reached target sysinit.target. May 10 00:45:50.169245 systemd[1]: Started motdgen.path. May 10 00:45:50.170007 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:45:50.171371 systemd[1]: Started logrotate.timer. May 10 00:45:50.172243 systemd[1]: Started mdadm.timer. May 10 00:45:50.172939 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:45:50.173809 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:45:50.173832 systemd[1]: Reached target paths.target. May 10 00:45:50.174592 systemd[1]: Reached target timers.target. May 10 00:45:50.175698 systemd[1]: Listening on dbus.socket. May 10 00:45:50.177537 systemd[1]: Starting docker.socket... May 10 00:45:50.369594 systemd[1]: Listening on sshd.socket. May 10 00:45:50.370618 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:50.371053 systemd[1]: Listening on docker.socket. May 10 00:45:50.371968 systemd[1]: Reached target sockets.target. May 10 00:45:50.372820 systemd[1]: Reached target basic.target. May 10 00:45:50.373686 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:50.373712 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:50.374636 systemd[1]: Starting containerd.service... May 10 00:45:50.376557 systemd[1]: Starting dbus.service... May 10 00:45:50.378245 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:45:50.380161 systemd[1]: Starting extend-filesystems.service... May 10 00:45:50.419503 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:45:50.420759 systemd[1]: Starting kubelet.service... May 10 00:45:50.422925 jq[1177]: false May 10 00:45:50.423144 systemd[1]: Starting motdgen.service... May 10 00:45:50.425798 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:45:50.428017 systemd[1]: Starting sshd-keygen.service... May 10 00:45:50.432120 extend-filesystems[1178]: Found loop1 May 10 00:45:50.433111 extend-filesystems[1178]: Found sr0 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda May 10 00:45:50.433111 extend-filesystems[1178]: Found vda1 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda2 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda3 May 10 00:45:50.433111 extend-filesystems[1178]: Found usr May 10 00:45:50.433111 extend-filesystems[1178]: Found vda4 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda6 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda7 May 10 00:45:50.433111 extend-filesystems[1178]: Found vda9 May 10 00:45:50.433111 extend-filesystems[1178]: Checking size of /dev/vda9 May 10 00:45:50.432304 systemd[1]: Starting systemd-logind.service... May 10 00:45:50.495481 dbus-daemon[1176]: [system] SELinux support is enabled May 10 00:45:50.485813 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:50.485928 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:45:50.486763 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:45:50.506207 jq[1198]: true May 10 00:45:50.488036 systemd[1]: Starting update-engine.service... May 10 00:45:50.493714 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:45:50.498381 systemd[1]: Started dbus.service. May 10 00:45:50.502696 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:45:50.502895 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:45:50.503982 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:45:50.504221 systemd[1]: Finished motdgen.service. May 10 00:45:50.507080 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:45:50.507286 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:45:50.510924 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:45:50.510973 systemd[1]: Reached target system-config.target. May 10 00:45:50.512382 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:45:50.512408 systemd[1]: Reached target user-config.target. May 10 00:45:50.513463 jq[1201]: true May 10 00:45:50.515556 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:45:50.516519 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:45:50.536175 extend-filesystems[1178]: Resized partition /dev/vda9 May 10 00:45:50.554150 env[1202]: time="2025-05-10T00:45:50.554010998Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:45:50.571617 env[1202]: time="2025-05-10T00:45:50.571553192Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:45:50.571758 env[1202]: time="2025-05-10T00:45:50.571732709Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573188 env[1202]: time="2025-05-10T00:45:50.573150088Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:50.573188 env[1202]: time="2025-05-10T00:45:50.573182489Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573435 env[1202]: time="2025-05-10T00:45:50.573402040Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:50.573435 env[1202]: time="2025-05-10T00:45:50.573426426Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573435 env[1202]: time="2025-05-10T00:45:50.573438869Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:45:50.573548 env[1202]: time="2025-05-10T00:45:50.573448568Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573548 env[1202]: time="2025-05-10T00:45:50.573520493Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573773 env[1202]: time="2025-05-10T00:45:50.573743471Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:50.573891 env[1202]: time="2025-05-10T00:45:50.573862153Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:50.573891 env[1202]: time="2025-05-10T00:45:50.573882922Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:45:50.573973 env[1202]: time="2025-05-10T00:45:50.573927085Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:45:50.573973 env[1202]: time="2025-05-10T00:45:50.573938176Z" level=info msg="metadata content store policy set" policy=shared May 10 00:45:50.619523 extend-filesystems[1225]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:45:50.782137 update_engine[1194]: I0510 00:45:50.780437 1194 main.cc:92] Flatcar Update Engine starting May 10 00:45:50.781209 systemd-logind[1188]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:45:50.781226 systemd-logind[1188]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:45:50.781494 systemd-logind[1188]: New seat seat0. May 10 00:45:50.782953 systemd[1]: Started update-engine.service. May 10 00:45:50.794647 update_engine[1194]: I0510 00:45:50.783051 1194 update_check_scheduler.cc:74] Next update check in 5m26s May 10 00:45:50.795048 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:45:50.795243 systemd[1]: Started systemd-logind.service. May 10 00:45:50.798612 systemd[1]: Started locksmithd.service. May 10 00:45:51.653380 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:45:51.674141 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:45:52.109804 extend-filesystems[1225]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:45:52.109804 extend-filesystems[1225]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:45:52.109804 extend-filesystems[1225]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:45:52.122647 sshd_keygen[1192]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:45:52.122771 extend-filesystems[1178]: Resized filesystem in /dev/vda9 May 10 00:45:52.122678 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:45:52.122893 systemd[1]: Finished extend-filesystems.service. May 10 00:45:52.144756 systemd[1]: Finished sshd-keygen.service. May 10 00:45:52.148214 systemd[1]: Starting issuegen.service... May 10 00:45:52.156774 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:45:52.156967 systemd[1]: Finished issuegen.service. May 10 00:45:52.159919 env[1202]: time="2025-05-10T00:45:52.159795892Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:45:52.159919 env[1202]: time="2025-05-10T00:45:52.159921958Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.159945623Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160190272Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160222001Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160243411Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160335243Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160368436Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160388273Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160405796Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160429891Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:45:52.160612 env[1202]: time="2025-05-10T00:45:52.160450129Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:45:52.160927 env[1202]: time="2025-05-10T00:45:52.160636478Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:45:52.160927 env[1202]: time="2025-05-10T00:45:52.160764759Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:45:52.161360 env[1202]: time="2025-05-10T00:45:52.161316003Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:45:52.161430 env[1202]: time="2025-05-10T00:45:52.161378360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161430 env[1202]: time="2025-05-10T00:45:52.161398207Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:45:52.161383 systemd[1]: Starting systemd-user-sessions.service... May 10 00:45:52.161708 env[1202]: time="2025-05-10T00:45:52.161631214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161708 env[1202]: time="2025-05-10T00:45:52.161648487Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161708 env[1202]: time="2025-05-10T00:45:52.161663535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161708 env[1202]: time="2025-05-10T00:45:52.161681248Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161708 env[1202]: time="2025-05-10T00:45:52.161700204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161909 env[1202]: time="2025-05-10T00:45:52.161715182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161909 env[1202]: time="2025-05-10T00:45:52.161729739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161909 env[1202]: time="2025-05-10T00:45:52.161744156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:45:52.161909 env[1202]: time="2025-05-10T00:45:52.161759204Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.161908154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.161937900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.161954551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.161971713Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.161999195Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.162013692Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.162086378Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:45:52.162191 env[1202]: time="2025-05-10T00:45:52.162148264Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:45:52.162645 env[1202]: time="2025-05-10T00:45:52.162573632Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.162656958Z" level=info msg="Connect containerd service" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.162769650Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.163575391Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.163892566Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.163938121Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.163993545Z" level=info msg="containerd successfully booted in 1.610890s" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164139299Z" level=info msg="Start subscribing containerd event" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164236651Z" level=info msg="Start recovering state" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164327492Z" level=info msg="Start event monitor" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164360574Z" level=info msg="Start snapshots syncer" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164380361Z" level=info msg="Start cni network conf syncer for default" May 10 00:45:52.193803 env[1202]: time="2025-05-10T00:45:52.164389708Z" level=info msg="Start streaming server" May 10 00:45:52.167124 systemd[1]: Started containerd.service. May 10 00:45:52.252388 systemd[1]: Finished systemd-user-sessions.service. May 10 00:45:52.256077 systemd[1]: Started getty@tty1.service. May 10 00:45:52.259441 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:45:52.261191 systemd[1]: Reached target getty.target. May 10 00:45:52.287794 bash[1222]: Updated "/home/core/.ssh/authorized_keys" May 10 00:45:52.289082 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:45:53.429609 systemd[1]: Started kubelet.service. May 10 00:45:53.431352 systemd[1]: Reached target multi-user.target. May 10 00:45:53.434492 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:45:53.446331 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:45:53.446542 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:45:53.448314 systemd[1]: Startup finished in 1.050s (kernel) + 4.954s (initrd) + 11.522s (userspace) = 17.528s. May 10 00:45:54.177054 kubelet[1261]: E0510 00:45:54.176904 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:54.178956 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:54.179113 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:54.179409 systemd[1]: kubelet.service: Consumed 1.872s CPU time. May 10 00:46:00.068714 systemd[1]: Created slice system-sshd.slice. May 10 00:46:00.070396 systemd[1]: Started sshd@0-10.0.0.129:22-10.0.0.1:51166.service. May 10 00:46:00.111497 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 51166 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.113872 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.127267 systemd-logind[1188]: New session 1 of user core. May 10 00:46:00.128623 systemd[1]: Created slice user-500.slice. May 10 00:46:00.130627 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:46:00.142500 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:46:00.144599 systemd[1]: Starting user@500.service... May 10 00:46:00.150401 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.256372 systemd[1273]: Queued start job for default target default.target. May 10 00:46:00.256998 systemd[1273]: Reached target paths.target. May 10 00:46:00.257035 systemd[1273]: Reached target sockets.target. May 10 00:46:00.257052 systemd[1273]: Reached target timers.target. May 10 00:46:00.257067 systemd[1273]: Reached target basic.target. May 10 00:46:00.257115 systemd[1273]: Reached target default.target. May 10 00:46:00.257148 systemd[1273]: Startup finished in 97ms. May 10 00:46:00.257316 systemd[1]: Started user@500.service. May 10 00:46:00.258688 systemd[1]: Started session-1.scope. May 10 00:46:00.315463 systemd[1]: Started sshd@1-10.0.0.129:22-10.0.0.1:51172.service. May 10 00:46:00.353726 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 51172 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.355075 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.359288 systemd-logind[1188]: New session 2 of user core. May 10 00:46:00.360730 systemd[1]: Started session-2.scope. May 10 00:46:00.418071 sshd[1282]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.421480 systemd[1]: sshd@1-10.0.0.129:22-10.0.0.1:51172.service: Deactivated successfully. May 10 00:46:00.422213 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:46:00.422746 systemd-logind[1188]: Session 2 logged out. Waiting for processes to exit. May 10 00:46:00.423921 systemd[1]: Started sshd@2-10.0.0.129:22-10.0.0.1:51176.service. May 10 00:46:00.424832 systemd-logind[1188]: Removed session 2. May 10 00:46:00.462801 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 51176 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.464204 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.468435 systemd-logind[1188]: New session 3 of user core. May 10 00:46:00.469215 systemd[1]: Started session-3.scope. May 10 00:46:00.520491 sshd[1288]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.524000 systemd[1]: sshd@2-10.0.0.129:22-10.0.0.1:51176.service: Deactivated successfully. May 10 00:46:00.524665 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:46:00.525309 systemd-logind[1188]: Session 3 logged out. Waiting for processes to exit. May 10 00:46:00.526489 systemd[1]: Started sshd@3-10.0.0.129:22-10.0.0.1:51192.service. May 10 00:46:00.527509 systemd-logind[1188]: Removed session 3. May 10 00:46:00.565723 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 51192 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.567657 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.572882 systemd-logind[1188]: New session 4 of user core. May 10 00:46:00.573918 systemd[1]: Started session-4.scope. May 10 00:46:00.635103 sshd[1295]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.638883 systemd[1]: sshd@3-10.0.0.129:22-10.0.0.1:51192.service: Deactivated successfully. May 10 00:46:00.639694 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:46:00.640486 systemd-logind[1188]: Session 4 logged out. Waiting for processes to exit. May 10 00:46:00.642314 systemd[1]: Started sshd@4-10.0.0.129:22-10.0.0.1:51200.service. May 10 00:46:00.643649 systemd-logind[1188]: Removed session 4. May 10 00:46:00.680278 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 51200 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.681877 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.687124 systemd-logind[1188]: New session 5 of user core. May 10 00:46:00.687765 systemd[1]: Started session-5.scope. May 10 00:46:00.749464 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:46:00.749732 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:00.761461 dbus-daemon[1176]: \xd0}I\x8f\xadU: received setenforce notice (enforcing=-1904624256) May 10 00:46:00.764164 sudo[1304]: pam_unix(sudo:session): session closed for user root May 10 00:46:00.766747 sshd[1301]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.770977 systemd[1]: sshd@4-10.0.0.129:22-10.0.0.1:51200.service: Deactivated successfully. May 10 00:46:00.771715 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:46:00.772479 systemd-logind[1188]: Session 5 logged out. Waiting for processes to exit. May 10 00:46:00.773899 systemd[1]: Started sshd@5-10.0.0.129:22-10.0.0.1:51202.service. May 10 00:46:00.775641 systemd-logind[1188]: Removed session 5. May 10 00:46:00.813101 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 51202 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:00.814937 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.819725 systemd-logind[1188]: New session 6 of user core. May 10 00:46:00.820546 systemd[1]: Started session-6.scope. May 10 00:46:00.879093 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:46:00.879293 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:00.882008 sudo[1312]: pam_unix(sudo:session): session closed for user root May 10 00:46:00.886834 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:46:00.887112 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:00.898312 systemd[1]: Stopping audit-rules.service... May 10 00:46:00.899000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:46:00.899983 auditctl[1315]: No rules May 10 00:46:00.900447 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:46:00.900647 systemd[1]: Stopped audit-rules.service. May 10 00:46:00.920043 kernel: kauditd_printk_skb: 195 callbacks suppressed May 10 00:46:00.920192 kernel: audit: type=1305 audit(1746837960.899:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:46:00.921002 systemd[1]: Starting audit-rules.service... May 10 00:46:00.899000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddd6f1c80 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.927685 kernel: audit: type=1300 audit(1746837960.899:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddd6f1c80 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.927805 kernel: audit: type=1327 audit(1746837960.899:204): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:46:00.899000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:46:00.929269 kernel: audit: type=1131 audit(1746837960.899:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.940065 augenrules[1332]: No rules May 10 00:46:00.940888 systemd[1]: Finished audit-rules.service. May 10 00:46:00.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.942040 sudo[1311]: pam_unix(sudo:session): session closed for user root May 10 00:46:00.943686 sshd[1308]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.942000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:00.947147 systemd[1]: sshd@5-10.0.0.129:22-10.0.0.1:51202.service: Deactivated successfully. May 10 00:46:00.947734 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:46:00.948284 systemd-logind[1188]: Session 6 logged out. Waiting for processes to exit. May 10 00:46:00.949457 systemd[1]: Started sshd@6-10.0.0.129:22-10.0.0.1:51206.service. May 10 00:46:00.950465 kernel: audit: type=1130 audit(1746837960.941:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.950512 kernel: audit: type=1106 audit(1746837960.942:207): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:00.950529 kernel: audit: type=1104 audit(1746837960.942:208): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:00.942000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:00.950690 systemd-logind[1188]: Removed session 6. May 10 00:46:00.945000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.024167 kernel: audit: type=1106 audit(1746837960.945:209): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.024345 kernel: audit: type=1104 audit(1746837960.945:210): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:00.945000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.028253 kernel: audit: type=1131 audit(1746837960.947:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.129:22-10.0.0.1:51202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.129:22-10.0.0.1:51202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.129:22-10.0.0.1:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:01.057063 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 51206 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:01.056000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.058000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.058000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9b8d930 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:01.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:01.058798 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:01.063100 systemd-logind[1188]: New session 7 of user core. May 10 00:46:01.064284 systemd[1]: Started session-7.scope. May 10 00:46:01.068000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.069000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:01.118000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:01.118000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:01.118785 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:46:01.119048 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:01.120000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:01.133619 systemd[1]: Starting coreos-metadata.service... May 10 00:46:01.141750 systemd[1]: coreos-metadata.service: Deactivated successfully. May 10 00:46:01.141948 systemd[1]: Finished coreos-metadata.service. May 10 00:46:01.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:01.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.170735 systemd[1]: Stopped kubelet.service. May 10 00:46:03.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.171012 systemd[1]: kubelet.service: Consumed 1.872s CPU time. May 10 00:46:03.173060 systemd[1]: Starting kubelet.service... May 10 00:46:03.197516 systemd[1]: Reloading. May 10 00:46:03.272358 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-10T00:46:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:46:03.272725 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-10T00:46:03Z" level=info msg="torcx already run" May 10 00:46:03.745869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:46:03.745888 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:46:03.766032 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.835000 audit: BPF prog-id=40 op=LOAD May 10 00:46:03.835000 audit: BPF prog-id=35 op=UNLOAD May 10 00:46:03.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit: BPF prog-id=41 op=LOAD May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.836000 audit: BPF prog-id=42 op=LOAD May 10 00:46:03.836000 audit: BPF prog-id=36 op=UNLOAD May 10 00:46:03.836000 audit: BPF prog-id=37 op=UNLOAD May 10 00:46:03.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.837000 audit: BPF prog-id=43 op=LOAD May 10 00:46:03.838000 audit: BPF prog-id=34 op=UNLOAD May 10 00:46:03.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.838000 audit: BPF prog-id=44 op=LOAD May 10 00:46:03.838000 audit: BPF prog-id=38 op=UNLOAD May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit: BPF prog-id=45 op=LOAD May 10 00:46:03.839000 audit: BPF prog-id=24 op=UNLOAD May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit: BPF prog-id=46 op=LOAD May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit: BPF prog-id=47 op=LOAD May 10 00:46:03.839000 audit: BPF prog-id=25 op=UNLOAD May 10 00:46:03.839000 audit: BPF prog-id=26 op=UNLOAD May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit: BPF prog-id=48 op=LOAD May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit: BPF prog-id=49 op=LOAD May 10 00:46:03.840000 audit: BPF prog-id=27 op=UNLOAD May 10 00:46:03.840000 audit: BPF prog-id=28 op=UNLOAD May 10 00:46:03.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit: BPF prog-id=50 op=LOAD May 10 00:46:03.841000 audit: BPF prog-id=29 op=UNLOAD May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit: BPF prog-id=51 op=LOAD May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.841000 audit: BPF prog-id=52 op=LOAD May 10 00:46:03.841000 audit: BPF prog-id=30 op=UNLOAD May 10 00:46:03.841000 audit: BPF prog-id=31 op=UNLOAD May 10 00:46:03.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.842000 audit: BPF prog-id=53 op=LOAD May 10 00:46:03.842000 audit: BPF prog-id=33 op=UNLOAD May 10 00:46:03.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.843000 audit: BPF prog-id=54 op=LOAD May 10 00:46:03.843000 audit: BPF prog-id=32 op=UNLOAD May 10 00:46:03.855641 systemd[1]: Started kubelet.service. May 10 00:46:03.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.857214 systemd[1]: Stopping kubelet.service... May 10 00:46:03.857579 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:46:03.857739 systemd[1]: Stopped kubelet.service. May 10 00:46:03.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.859297 systemd[1]: Starting kubelet.service... May 10 00:46:04.015044 systemd[1]: Started kubelet.service. May 10 00:46:04.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:04.125119 kubelet[1446]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:04.125119 kubelet[1446]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:46:04.125119 kubelet[1446]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:04.126744 kubelet[1446]: I0510 00:46:04.126683 1446 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:46:04.447333 kubelet[1446]: I0510 00:46:04.447149 1446 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:46:04.447333 kubelet[1446]: I0510 00:46:04.447206 1446 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:46:04.447529 kubelet[1446]: I0510 00:46:04.447486 1446 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:46:04.512790 kubelet[1446]: I0510 00:46:04.512714 1446 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:46:04.542574 kubelet[1446]: E0510 00:46:04.542525 1446 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:46:04.542574 kubelet[1446]: I0510 00:46:04.542569 1446 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:46:04.557994 kubelet[1446]: I0510 00:46:04.557949 1446 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:46:04.568695 kubelet[1446]: I0510 00:46:04.568621 1446 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:46:04.568962 kubelet[1446]: I0510 00:46:04.568897 1446 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:46:04.569250 kubelet[1446]: I0510 00:46:04.568956 1446 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.129","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:46:04.569393 kubelet[1446]: I0510 00:46:04.569258 1446 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:46:04.569393 kubelet[1446]: I0510 00:46:04.569273 1446 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:46:04.569502 kubelet[1446]: I0510 00:46:04.569397 1446 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:04.592873 kubelet[1446]: I0510 00:46:04.592830 1446 kubelet.go:408] "Attempting to sync node with API server" May 10 00:46:04.592959 kubelet[1446]: I0510 00:46:04.592889 1446 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:46:04.592959 kubelet[1446]: I0510 00:46:04.592934 1446 kubelet.go:314] "Adding apiserver pod source" May 10 00:46:04.592959 kubelet[1446]: I0510 00:46:04.592949 1446 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:46:04.593190 kubelet[1446]: E0510 00:46:04.593132 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:04.593267 kubelet[1446]: E0510 00:46:04.593211 1446 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:04.614701 kubelet[1446]: W0510 00:46:04.614644 1446 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 00:46:04.614701 kubelet[1446]: W0510 00:46:04.614644 1446 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.129" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 00:46:04.614896 kubelet[1446]: E0510 00:46:04.614727 1446 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.129\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 10 00:46:04.614896 kubelet[1446]: E0510 00:46:04.614728 1446 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 10 00:46:04.616937 kubelet[1446]: I0510 00:46:04.616493 1446 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:46:04.620284 kubelet[1446]: I0510 00:46:04.620252 1446 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:46:04.621403 kubelet[1446]: W0510 00:46:04.621370 1446 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:46:04.622587 kubelet[1446]: I0510 00:46:04.622158 1446 server.go:1269] "Started kubelet" May 10 00:46:04.622587 kubelet[1446]: I0510 00:46:04.622317 1446 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:46:04.624146 kubelet[1446]: I0510 00:46:04.624059 1446 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:46:04.624566 kubelet[1446]: I0510 00:46:04.624516 1446 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:46:04.624566 kubelet[1446]: I0510 00:46:04.624201 1446 server.go:460] "Adding debug handlers to kubelet server" May 10 00:46:04.627000 audit[1446]: AVC avc: denied { mac_admin } for pid=1446 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.627000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:04.628251 kubelet[1446]: E0510 00:46:04.627989 1446 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:46:04.627000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b4d8c0 a1=c000351680 a2=c000b4d890 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.627000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:04.628000 audit[1446]: AVC avc: denied { mac_admin } for pid=1446 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.628000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:04.628000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00078ae20 a1=c000351698 a2=c000b4d950 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:04.628789 kubelet[1446]: I0510 00:46:04.628349 1446 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:46:04.628789 kubelet[1446]: I0510 00:46:04.628429 1446 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:46:04.628789 kubelet[1446]: I0510 00:46:04.628551 1446 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:46:04.628789 kubelet[1446]: I0510 00:46:04.628575 1446 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:46:04.629314 kubelet[1446]: I0510 00:46:04.629126 1446 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:46:04.630721 kubelet[1446]: I0510 00:46:04.630696 1446 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:46:04.630793 kubelet[1446]: I0510 00:46:04.630754 1446 reconciler.go:26] "Reconciler: start to sync state" May 10 00:46:04.631354 kubelet[1446]: E0510 00:46:04.631309 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:04.632100 kubelet[1446]: I0510 00:46:04.632077 1446 factory.go:221] Registration of the systemd container factory successfully May 10 00:46:04.632202 kubelet[1446]: I0510 00:46:04.632181 1446 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:46:04.633460 kubelet[1446]: I0510 00:46:04.633437 1446 factory.go:221] Registration of the containerd container factory successfully May 10 00:46:04.647464 kubelet[1446]: I0510 00:46:04.647367 1446 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:46:04.647464 kubelet[1446]: I0510 00:46:04.647432 1446 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:46:04.647464 kubelet[1446]: I0510 00:46:04.647462 1446 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:04.653572 kubelet[1446]: E0510 00:46:04.653462 1446 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.129\" not found" node="10.0.0.129" May 10 00:46:04.732307 kubelet[1446]: E0510 00:46:04.732247 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:04.832884 kubelet[1446]: E0510 00:46:04.832792 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:04.933705 kubelet[1446]: E0510 00:46:04.933634 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.034729 kubelet[1446]: E0510 00:46:05.034583 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.135715 kubelet[1446]: E0510 00:46:05.135653 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.150523 kubelet[1446]: E0510 00:46:05.150455 1446 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.129" not found May 10 00:46:05.239161 kubelet[1446]: I0510 00:46:05.234736 1446 policy_none.go:49] "None policy: Start" May 10 00:46:05.239161 kubelet[1446]: E0510 00:46:05.235733 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.239161 kubelet[1446]: I0510 00:46:05.235818 1446 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:46:05.239161 kubelet[1446]: I0510 00:46:05.235844 1446 state_mem.go:35] "Initializing new in-memory state store" May 10 00:46:05.254101 systemd[1]: Created slice kubepods.slice. May 10 00:46:05.256000 audit[1461]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.256000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd4b7cdc0 a2=0 a3=7fffd4b7cdac items=0 ppid=1446 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:46:05.257000 audit[1466]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.257000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc0d8fd950 a2=0 a3=7ffc0d8fd93c items=0 ppid=1446 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:46:05.260915 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:46:05.268190 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:46:05.278179 kubelet[1446]: I0510 00:46:05.278134 1446 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:46:05.278179 kubelet[1446]: I0510 00:46:05.278205 1446 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:46:05.278431 kubelet[1446]: I0510 00:46:05.278373 1446 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:46:05.278431 kubelet[1446]: I0510 00:46:05.278394 1446 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:46:05.278000 audit[1446]: AVC avc: denied { mac_admin } for pid=1446 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:05.278000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:05.278000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ec98f0 a1=c000edeb88 a2=c000ec98c0 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.278000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:05.282105 kubelet[1446]: I0510 00:46:05.282081 1446 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:46:05.260000 audit[1468]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.260000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8c65f250 a2=0 a3=7ffc8c65f23c items=0 ppid=1446 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:05.284107 kubelet[1446]: E0510 00:46:05.284067 1446 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.129\" not found" May 10 00:46:05.286000 audit[1473]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.286000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff66b7ed70 a2=0 a3=7fff66b7ed5c items=0 ppid=1446 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:05.333000 audit[1478]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.333000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeef6bec10 a2=0 a3=7ffeef6bebfc items=0 ppid=1446 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:46:05.334176 kubelet[1446]: I0510 00:46:05.333899 1446 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:46:05.334000 audit[1479]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:05.334000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc392dfda0 a2=0 a3=7ffc392dfd8c items=0 ppid=1446 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:46:05.335000 audit[1480]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.335000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde21b51e0 a2=0 a3=10e3 items=0 ppid=1446 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:46:05.335553 kubelet[1446]: I0510 00:46:05.335151 1446 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:46:05.335553 kubelet[1446]: I0510 00:46:05.335210 1446 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:46:05.335553 kubelet[1446]: I0510 00:46:05.335247 1446 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:46:05.335553 kubelet[1446]: E0510 00:46:05.335386 1446 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 00:46:05.335000 audit[1481]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:05.335000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c7293b0 a2=0 a3=7ffd9c72939c items=0 ppid=1446 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:46:05.336000 audit[1482]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.336000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcadd78a00 a2=0 a3=7ffcadd789ec items=0 ppid=1446 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:46:05.338000 audit[1484]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:05.338000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8b9eee80 a2=0 a3=7ffd8b9eee6c items=0 ppid=1446 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:46:05.338000 audit[1483]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:05.338000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff837ca710 a2=0 a3=7fff837ca6fc items=0 ppid=1446 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:46:05.340000 audit[1485]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:05.340000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff88f59890 a2=0 a3=7fff88f5987c items=0 ppid=1446 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:46:05.379595 kubelet[1446]: I0510 00:46:05.379519 1446 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.129" May 10 00:46:05.385168 kubelet[1446]: I0510 00:46:05.385094 1446 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.129" May 10 00:46:05.385168 kubelet[1446]: E0510 00:46:05.385138 1446 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.129\": node \"10.0.0.129\" not found" May 10 00:46:05.400011 kubelet[1446]: E0510 00:46:05.399940 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.450012 kubelet[1446]: I0510 00:46:05.449505 1446 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 00:46:05.450012 kubelet[1446]: W0510 00:46:05.449797 1446 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:46:05.450012 kubelet[1446]: W0510 00:46:05.449873 1446 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:46:05.500800 kubelet[1446]: E0510 00:46:05.500727 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.538000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:05.538000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:05.538407 sudo[1341]: pam_unix(sudo:session): session closed for user root May 10 00:46:05.539784 sshd[1338]: pam_unix(sshd:session): session closed for user core May 10 00:46:05.540000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.540000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.542322 systemd[1]: sshd@6-10.0.0.129:22-10.0.0.1:51206.service: Deactivated successfully. May 10 00:46:05.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.129:22-10.0.0.1:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:05.543268 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:46:05.543841 systemd-logind[1188]: Session 7 logged out. Waiting for processes to exit. May 10 00:46:05.544875 systemd-logind[1188]: Removed session 7. May 10 00:46:05.593758 kubelet[1446]: E0510 00:46:05.593674 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:05.601976 kubelet[1446]: E0510 00:46:05.601907 1446 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.129\" not found" May 10 00:46:05.703386 kubelet[1446]: I0510 00:46:05.703308 1446 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 00:46:05.703837 env[1202]: time="2025-05-10T00:46:05.703777199Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:46:05.704416 kubelet[1446]: I0510 00:46:05.704061 1446 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 00:46:06.594511 kubelet[1446]: I0510 00:46:06.594442 1446 apiserver.go:52] "Watching apiserver" May 10 00:46:06.594511 kubelet[1446]: E0510 00:46:06.594466 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:06.626564 kubelet[1446]: E0510 00:46:06.626504 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:06.631500 kubelet[1446]: I0510 00:46:06.631445 1446 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:46:06.633771 systemd[1]: Created slice kubepods-besteffort-pod44abcb75_5b72_471b_94c6_fd6239ec413e.slice. May 10 00:46:06.641715 kubelet[1446]: I0510 00:46:06.641653 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c7bafc47-1a33-4bd1-8f25-1a48cd1d990b-varrun\") pod \"csi-node-driver-xjwvd\" (UID: \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\") " pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:06.641715 kubelet[1446]: I0510 00:46:06.641708 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c7bafc47-1a33-4bd1-8f25-1a48cd1d990b-kubelet-dir\") pod \"csi-node-driver-xjwvd\" (UID: \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\") " pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:06.641921 kubelet[1446]: I0510 00:46:06.641737 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c7bafc47-1a33-4bd1-8f25-1a48cd1d990b-registration-dir\") pod \"csi-node-driver-xjwvd\" (UID: \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\") " pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:06.641921 kubelet[1446]: I0510 00:46:06.641761 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ts788\" (UniqueName: \"kubernetes.io/projected/c17e1952-cfd5-4562-88b5-1577a2091147-kube-api-access-ts788\") pod \"kube-proxy-6lc7w\" (UID: \"c17e1952-cfd5-4562-88b5-1577a2091147\") " pod="kube-system/kube-proxy-6lc7w" May 10 00:46:06.641921 kubelet[1446]: I0510 00:46:06.641783 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-policysync\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.641921 kubelet[1446]: I0510 00:46:06.641836 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c7bafc47-1a33-4bd1-8f25-1a48cd1d990b-socket-dir\") pod \"csi-node-driver-xjwvd\" (UID: \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\") " pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:06.641921 kubelet[1446]: I0510 00:46:06.641865 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c17e1952-cfd5-4562-88b5-1577a2091147-kube-proxy\") pod \"kube-proxy-6lc7w\" (UID: \"c17e1952-cfd5-4562-88b5-1577a2091147\") " pod="kube-system/kube-proxy-6lc7w" May 10 00:46:06.642062 kubelet[1446]: I0510 00:46:06.641888 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-cni-bin-dir\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642062 kubelet[1446]: I0510 00:46:06.641914 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-cni-log-dir\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642062 kubelet[1446]: I0510 00:46:06.641935 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-flexvol-driver-host\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642062 kubelet[1446]: I0510 00:46:06.642006 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c17e1952-cfd5-4562-88b5-1577a2091147-lib-modules\") pod \"kube-proxy-6lc7w\" (UID: \"c17e1952-cfd5-4562-88b5-1577a2091147\") " pod="kube-system/kube-proxy-6lc7w" May 10 00:46:06.642158 kubelet[1446]: I0510 00:46:06.642062 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-lib-modules\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642158 kubelet[1446]: I0510 00:46:06.642103 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-var-run-calico\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642158 kubelet[1446]: I0510 00:46:06.642127 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9xgft\" (UniqueName: \"kubernetes.io/projected/44abcb75-5b72-471b-94c6-fd6239ec413e-kube-api-access-9xgft\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642266 kubelet[1446]: I0510 00:46:06.642160 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-cni-net-dir\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642266 kubelet[1446]: I0510 00:46:06.642183 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brhwn\" (UniqueName: \"kubernetes.io/projected/c7bafc47-1a33-4bd1-8f25-1a48cd1d990b-kube-api-access-brhwn\") pod \"csi-node-driver-xjwvd\" (UID: \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\") " pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:06.642266 kubelet[1446]: I0510 00:46:06.642215 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c17e1952-cfd5-4562-88b5-1577a2091147-xtables-lock\") pod \"kube-proxy-6lc7w\" (UID: \"c17e1952-cfd5-4562-88b5-1577a2091147\") " pod="kube-system/kube-proxy-6lc7w" May 10 00:46:06.642266 kubelet[1446]: I0510 00:46:06.642233 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-xtables-lock\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642266 kubelet[1446]: I0510 00:46:06.642258 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/44abcb75-5b72-471b-94c6-fd6239ec413e-tigera-ca-bundle\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642398 kubelet[1446]: I0510 00:46:06.642287 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/44abcb75-5b72-471b-94c6-fd6239ec413e-node-certs\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.642398 kubelet[1446]: I0510 00:46:06.642309 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/44abcb75-5b72-471b-94c6-fd6239ec413e-var-lib-calico\") pod \"calico-node-wgwj2\" (UID: \"44abcb75-5b72-471b-94c6-fd6239ec413e\") " pod="calico-system/calico-node-wgwj2" May 10 00:46:06.647127 systemd[1]: Created slice kubepods-besteffort-podc17e1952_cfd5_4562_88b5_1577a2091147.slice. May 10 00:46:06.743940 kubelet[1446]: I0510 00:46:06.743896 1446 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:46:06.744337 kubelet[1446]: E0510 00:46:06.744306 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.744392 kubelet[1446]: W0510 00:46:06.744338 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.744392 kubelet[1446]: E0510 00:46:06.744379 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.744658 kubelet[1446]: E0510 00:46:06.744640 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.744658 kubelet[1446]: W0510 00:46:06.744652 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.744754 kubelet[1446]: E0510 00:46:06.744668 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.745076 kubelet[1446]: E0510 00:46:06.745040 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.745076 kubelet[1446]: W0510 00:46:06.745060 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.745076 kubelet[1446]: E0510 00:46:06.745089 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.745488 kubelet[1446]: E0510 00:46:06.745459 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.745488 kubelet[1446]: W0510 00:46:06.745477 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.745572 kubelet[1446]: E0510 00:46:06.745495 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.745686 kubelet[1446]: E0510 00:46:06.745668 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.745686 kubelet[1446]: W0510 00:46:06.745682 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.745765 kubelet[1446]: E0510 00:46:06.745698 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.745880 kubelet[1446]: E0510 00:46:06.745868 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.745880 kubelet[1446]: W0510 00:46:06.745878 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.745961 kubelet[1446]: E0510 00:46:06.745937 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.746145 kubelet[1446]: E0510 00:46:06.746127 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.746145 kubelet[1446]: W0510 00:46:06.746141 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.746258 kubelet[1446]: E0510 00:46:06.746159 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.746413 kubelet[1446]: E0510 00:46:06.746387 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.746413 kubelet[1446]: W0510 00:46:06.746401 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.746413 kubelet[1446]: E0510 00:46:06.746412 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.747053 kubelet[1446]: E0510 00:46:06.747014 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.747053 kubelet[1446]: W0510 00:46:06.747044 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.747053 kubelet[1446]: E0510 00:46:06.747055 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.844206 kubelet[1446]: E0510 00:46:06.844149 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.844206 kubelet[1446]: W0510 00:46:06.844171 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.844206 kubelet[1446]: E0510 00:46:06.844199 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.844459 kubelet[1446]: E0510 00:46:06.844391 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.844459 kubelet[1446]: W0510 00:46:06.844402 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.844459 kubelet[1446]: E0510 00:46:06.844411 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.844705 kubelet[1446]: E0510 00:46:06.844624 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.844705 kubelet[1446]: W0510 00:46:06.844638 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.844705 kubelet[1446]: E0510 00:46:06.844647 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.880302 kubelet[1446]: E0510 00:46:06.880251 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.880302 kubelet[1446]: W0510 00:46:06.880283 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.880302 kubelet[1446]: E0510 00:46:06.880310 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.886774 kubelet[1446]: E0510 00:46:06.886729 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.886774 kubelet[1446]: W0510 00:46:06.886755 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.886774 kubelet[1446]: E0510 00:46:06.886780 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.887654 kubelet[1446]: E0510 00:46:06.887632 1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:06.887744 kubelet[1446]: W0510 00:46:06.887654 1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:06.887744 kubelet[1446]: E0510 00:46:06.887678 1446 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:06.944975 kubelet[1446]: E0510 00:46:06.944914 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:06.945839 env[1202]: time="2025-05-10T00:46:06.945779901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wgwj2,Uid:44abcb75-5b72-471b-94c6-fd6239ec413e,Namespace:calico-system,Attempt:0,}" May 10 00:46:06.950000 kubelet[1446]: E0510 00:46:06.949965 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:06.950590 env[1202]: time="2025-05-10T00:46:06.950555589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6lc7w,Uid:c17e1952-cfd5-4562-88b5-1577a2091147,Namespace:kube-system,Attempt:0,}" May 10 00:46:07.594855 kubelet[1446]: E0510 00:46:07.594792 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:08.336582 kubelet[1446]: E0510 00:46:08.336523 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:08.595665 kubelet[1446]: E0510 00:46:08.595488 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:09.596430 kubelet[1446]: E0510 00:46:09.596345 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:10.335738 kubelet[1446]: E0510 00:46:10.335646 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:10.596816 kubelet[1446]: E0510 00:46:10.596631 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:10.769801 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1249000005.mount: Deactivated successfully. May 10 00:46:10.784415 env[1202]: time="2025-05-10T00:46:10.784314736Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.786098 env[1202]: time="2025-05-10T00:46:10.785999546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.793411 env[1202]: time="2025-05-10T00:46:10.793314757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.795502 env[1202]: time="2025-05-10T00:46:10.795388126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.797187 env[1202]: time="2025-05-10T00:46:10.797117550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.798428 env[1202]: time="2025-05-10T00:46:10.798389766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.800223 env[1202]: time="2025-05-10T00:46:10.800159937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.802211 env[1202]: time="2025-05-10T00:46:10.802155520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:10.844699 env[1202]: time="2025-05-10T00:46:10.844424885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:10.844699 env[1202]: time="2025-05-10T00:46:10.844485128Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:10.844699 env[1202]: time="2025-05-10T00:46:10.844502711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:10.844919 env[1202]: time="2025-05-10T00:46:10.844773309Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167 pid=1516 runtime=io.containerd.runc.v2 May 10 00:46:10.849691 env[1202]: time="2025-05-10T00:46:10.849036696Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:10.849691 env[1202]: time="2025-05-10T00:46:10.849131984Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:10.849691 env[1202]: time="2025-05-10T00:46:10.849145670Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:10.849975 env[1202]: time="2025-05-10T00:46:10.849678299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/318410934dc8211abcbcc362d888b6855204471d2ae5fed9169d5b9f681bbeb2 pid=1530 runtime=io.containerd.runc.v2 May 10 00:46:10.870429 systemd[1]: Started cri-containerd-3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167.scope. May 10 00:46:10.914673 systemd[1]: Started cri-containerd-318410934dc8211abcbcc362d888b6855204471d2ae5fed9169d5b9f681bbeb2.scope. May 10 00:46:10.990135 kernel: kauditd_printk_skb: 243 callbacks suppressed May 10 00:46:10.990314 kernel: audit: type=1400 audit(1746837970.987:420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997095 kernel: audit: type=1400 audit(1746837970.987:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997182 kernel: audit: type=1400 audit(1746837970.987:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.001053 kernel: audit: type=1400 audit(1746837970.987:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.001136 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:46:11.001167 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:46:11.001188 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:46:11.001205 kernel: audit: backlog limit exceeded May 10 00:46:11.001227 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:46:11.001246 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:46:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.993000 audit: BPF prog-id=55 op=LOAD May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306531373462613835396235316537643337306337626131383466 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306531373462613835396235316537643337306337626131383466 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit: BPF prog-id=56 op=LOAD May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1530 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383431303933346463383231316162636263633336326438383862 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1530 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383431303933346463383231316162636263633336326438383862 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.994000 audit: BPF prog-id=57 op=LOAD May 10 00:46:10.997000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:10.997000 audit: BPF prog-id=58 op=LOAD May 10 00:46:10.994000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000218b10 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306531373462613835396235316537643337306337626131383466 May 10 00:46:10.997000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b1f0 items=0 ppid=1530 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383431303933346463383231316162636263633336326438383862 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit: BPF prog-id=59 op=LOAD May 10 00:46:11.000000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000218b58 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306531373462613835396235316537643337306337626131383466 May 10 00:46:11.005000 audit: BPF prog-id=59 op=UNLOAD May 10 00:46:11.005000 audit: BPF prog-id=57 op=UNLOAD May 10 00:46:11.005000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.005000 audit: BPF prog-id=60 op=LOAD May 10 00:46:11.005000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000218f68 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306531373462613835396235316537643337306337626131383466 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.000000 audit: BPF prog-id=61 op=LOAD May 10 00:46:11.000000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b238 items=0 ppid=1530 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383431303933346463383231316162636263633336326438383862 May 10 00:46:11.011000 audit: BPF prog-id=61 op=UNLOAD May 10 00:46:11.011000 audit: BPF prog-id=58 op=UNLOAD May 10 00:46:11.011000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:11.011000 audit: BPF prog-id=62 op=LOAD May 10 00:46:11.011000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b648 items=0 ppid=1530 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383431303933346463383231316162636263633336326438383862 May 10 00:46:11.029568 env[1202]: time="2025-05-10T00:46:11.029492669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wgwj2,Uid:44abcb75-5b72-471b-94c6-fd6239ec413e,Namespace:calico-system,Attempt:0,} returns sandbox id \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\"" May 10 00:46:11.030931 kubelet[1446]: E0510 00:46:11.030893 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:11.032576 env[1202]: time="2025-05-10T00:46:11.032532271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:46:11.034072 env[1202]: time="2025-05-10T00:46:11.034005454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6lc7w,Uid:c17e1952-cfd5-4562-88b5-1577a2091147,Namespace:kube-system,Attempt:0,} returns sandbox id \"318410934dc8211abcbcc362d888b6855204471d2ae5fed9169d5b9f681bbeb2\"" May 10 00:46:11.034965 kubelet[1446]: E0510 00:46:11.034625 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:11.597694 kubelet[1446]: E0510 00:46:11.597600 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:12.336693 kubelet[1446]: E0510 00:46:12.336614 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:12.598599 kubelet[1446]: E0510 00:46:12.598408 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:13.412242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2360948167.mount: Deactivated successfully. May 10 00:46:13.599119 kubelet[1446]: E0510 00:46:13.599046 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:14.054359 env[1202]: time="2025-05-10T00:46:14.054270849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.082132 env[1202]: time="2025-05-10T00:46:14.082071054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.113477 env[1202]: time="2025-05-10T00:46:14.113412622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.122921 env[1202]: time="2025-05-10T00:46:14.122861936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.123464 env[1202]: time="2025-05-10T00:46:14.123427216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:46:14.124551 env[1202]: time="2025-05-10T00:46:14.124523493Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 00:46:14.125772 env[1202]: time="2025-05-10T00:46:14.125740976Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:46:14.218861 env[1202]: time="2025-05-10T00:46:14.218781393Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5\"" May 10 00:46:14.219696 env[1202]: time="2025-05-10T00:46:14.219658879Z" level=info msg="StartContainer for \"ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5\"" May 10 00:46:14.237601 systemd[1]: Started cri-containerd-ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5.scope. May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb56e9c3208 items=0 ppid=1516 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333365653239313563616234663935636362616536393438396336 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.254000 audit: BPF prog-id=63 op=LOAD May 10 00:46:14.254000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e9e98 items=0 ppid=1516 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333365653239313563616234663935636362616536393438396336 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit: BPF prog-id=64 op=LOAD May 10 00:46:14.255000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e9ee8 items=0 ppid=1516 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333365653239313563616234663935636362616536393438396336 May 10 00:46:14.255000 audit: BPF prog-id=64 op=UNLOAD May 10 00:46:14.255000 audit: BPF prog-id=63 op=UNLOAD May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.255000 audit: BPF prog-id=65 op=LOAD May 10 00:46:14.255000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e9f78 items=0 ppid=1516 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333365653239313563616234663935636362616536393438396336 May 10 00:46:14.268992 env[1202]: time="2025-05-10T00:46:14.268926912Z" level=info msg="StartContainer for \"ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5\" returns successfully" May 10 00:46:14.279079 systemd[1]: cri-containerd-ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5.scope: Deactivated successfully. May 10 00:46:14.285000 audit: BPF prog-id=65 op=UNLOAD May 10 00:46:14.336416 kubelet[1446]: E0510 00:46:14.336255 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:14.354538 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5-rootfs.mount: Deactivated successfully. May 10 00:46:14.355349 kubelet[1446]: E0510 00:46:14.354994 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:14.478263 env[1202]: time="2025-05-10T00:46:14.478171986Z" level=info msg="shim disconnected" id=ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5 May 10 00:46:14.478263 env[1202]: time="2025-05-10T00:46:14.478231468Z" level=warning msg="cleaning up after shim disconnected" id=ab33ee2915cab4f95ccbae69489c64326803caf77e652d50028184514d9846c5 namespace=k8s.io May 10 00:46:14.478263 env[1202]: time="2025-05-10T00:46:14.478240434Z" level=info msg="cleaning up dead shim" May 10 00:46:14.485830 env[1202]: time="2025-05-10T00:46:14.485763856Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1642 runtime=io.containerd.runc.v2\n" May 10 00:46:14.600294 kubelet[1446]: E0510 00:46:14.600130 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:15.357227 kubelet[1446]: E0510 00:46:15.357182 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:15.451430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4062620222.mount: Deactivated successfully. May 10 00:46:15.600320 kubelet[1446]: E0510 00:46:15.600263 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:16.336063 kubelet[1446]: E0510 00:46:16.335968 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:16.565374 env[1202]: time="2025-05-10T00:46:16.565296505Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.572283 env[1202]: time="2025-05-10T00:46:16.572232154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.574505 env[1202]: time="2025-05-10T00:46:16.574452138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.578137 env[1202]: time="2025-05-10T00:46:16.578103127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.578750 env[1202]: time="2025-05-10T00:46:16.578712470Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 00:46:16.579895 env[1202]: time="2025-05-10T00:46:16.579796783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:46:16.580822 env[1202]: time="2025-05-10T00:46:16.580789676Z" level=info msg="CreateContainer within sandbox \"318410934dc8211abcbcc362d888b6855204471d2ae5fed9169d5b9f681bbeb2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:46:16.601043 kubelet[1446]: E0510 00:46:16.600906 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:16.606144 env[1202]: time="2025-05-10T00:46:16.606075034Z" level=info msg="CreateContainer within sandbox \"318410934dc8211abcbcc362d888b6855204471d2ae5fed9169d5b9f681bbeb2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"07c2206c8b046a75369c9822b05380331cdd9b2bf40afe7d80e0bca24700d9d4\"" May 10 00:46:16.606719 env[1202]: time="2025-05-10T00:46:16.606682103Z" level=info msg="StartContainer for \"07c2206c8b046a75369c9822b05380331cdd9b2bf40afe7d80e0bca24700d9d4\"" May 10 00:46:16.624558 systemd[1]: run-containerd-runc-k8s.io-07c2206c8b046a75369c9822b05380331cdd9b2bf40afe7d80e0bca24700d9d4-runc.ZpXC2J.mount: Deactivated successfully. May 10 00:46:16.627476 systemd[1]: Started cri-containerd-07c2206c8b046a75369c9822b05380331cdd9b2bf40afe7d80e0bca24700d9d4.scope. May 10 00:46:16.642000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644560 kernel: kauditd_printk_skb: 164 callbacks suppressed May 10 00:46:16.644792 kernel: audit: type=1400 audit(1746837976.642:463): avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.653924 kernel: audit: type=1300 audit(1746837976.642:463): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7f1b5c7c68 items=0 ppid=1530 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.654013 kernel: audit: type=1327 audit(1746837976.642:463): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633232303663386230343661373533363963393832326230353338 May 10 00:46:16.642000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7f1b5c7c68 items=0 ppid=1530 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633232303663386230343661373533363963393832326230353338 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.661463 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.664805 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.664869 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.671177 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.671233 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.676120 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.676278 env[1202]: time="2025-05-10T00:46:16.675900517Z" level=info msg="StartContainer for \"07c2206c8b046a75369c9822b05380331cdd9b2bf40afe7d80e0bca24700d9d4\" returns successfully" May 10 00:46:16.643000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.680784 kernel: audit: type=1400 audit(1746837976.643:464): avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.643000 audit: BPF prog-id=66 op=LOAD May 10 00:46:16.643000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000098e98 items=0 ppid=1530 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633232303663386230343661373533363963393832326230353338 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.644000 audit: BPF prog-id=67 op=LOAD May 10 00:46:16.644000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000098ee8 items=0 ppid=1530 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633232303663386230343661373533363963393832326230353338 May 10 00:46:16.648000 audit: BPF prog-id=67 op=UNLOAD May 10 00:46:16.648000 audit: BPF prog-id=66 op=UNLOAD May 10 00:46:16.648000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.648000 audit: BPF prog-id=68 op=LOAD May 10 00:46:16.648000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000098f78 items=0 ppid=1530 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633232303663386230343661373533363963393832326230353338 May 10 00:46:16.789000 audit[1723]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.789000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb0632ce0 a2=0 a3=7ffeb0632ccc items=0 ppid=1673 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:16.790000 audit[1724]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:16.790000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd118ba770 a2=0 a3=7ffd118ba75c items=0 ppid=1673 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:16.791000 audit[1726]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:16.791000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffb9d6e30 a2=0 a3=7ffffb9d6e1c items=0 ppid=1673 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:16.792000 audit[1725]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.792000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe799a7230 a2=0 a3=7ffe799a721c items=0 ppid=1673 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:16.793000 audit[1727]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:16.793000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7dd68980 a2=0 a3=7ffe7dd6896c items=0 ppid=1673 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:16.794000 audit[1728]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.794000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4f6741b0 a2=0 a3=7fff4f67419c items=0 ppid=1673 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:16.892000 audit[1729]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.892000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffea9ea36d0 a2=0 a3=7ffea9ea36bc items=0 ppid=1673 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:16.895000 audit[1731]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.895000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcbd216a00 a2=0 a3=7ffcbd2169ec items=0 ppid=1673 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:46:16.898000 audit[1734]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.898000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4c40c890 a2=0 a3=7ffc4c40c87c items=0 ppid=1673 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:46:16.900000 audit[1735]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.900000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefbdc7d40 a2=0 a3=7ffefbdc7d2c items=0 ppid=1673 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:16.903000 audit[1737]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.903000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc67fcf50 a2=0 a3=7ffdc67fcf3c items=0 ppid=1673 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:16.904000 audit[1738]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.904000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd897ce2c0 a2=0 a3=7ffd897ce2ac items=0 ppid=1673 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:16.907000 audit[1740]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.907000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4f844db0 a2=0 a3=7ffd4f844d9c items=0 ppid=1673 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:16.911000 audit[1743]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.911000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1f8e2340 a2=0 a3=7fff1f8e232c items=0 ppid=1673 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:46:16.912000 audit[1744]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.912000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2f5deec0 a2=0 a3=7ffc2f5deeac items=0 ppid=1673 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:16.915000 audit[1746]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.915000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd8c40330 a2=0 a3=7ffdd8c4031c items=0 ppid=1673 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:16.916000 audit[1747]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.916000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff87ed2540 a2=0 a3=7fff87ed252c items=0 ppid=1673 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:16.919000 audit[1749]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.919000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff58769210 a2=0 a3=7fff587691fc items=0 ppid=1673 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:16.923000 audit[1752]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.923000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff3f4af40 a2=0 a3=7ffff3f4af2c items=0 ppid=1673 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:16.928000 audit[1755]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.928000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0f6e42d0 a2=0 a3=7fff0f6e42bc items=0 ppid=1673 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:16.929000 audit[1756]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.929000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd9c119420 a2=0 a3=7ffd9c11940c items=0 ppid=1673 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:16.932000 audit[1758]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.932000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffee6343ab0 a2=0 a3=7ffee6343a9c items=0 ppid=1673 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:16.957000 audit[1762]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.957000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd389cdf50 a2=0 a3=7ffd389cdf3c items=0 ppid=1673 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:16.958000 audit[1763]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.958000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde8ebcb60 a2=0 a3=7ffde8ebcb4c items=0 ppid=1673 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:16.961000 audit[1765]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:16.961000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc066b3bf0 a2=0 a3=7ffc066b3bdc items=0 ppid=1673 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:16.985000 audit[1771]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:16.985000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd5cc13950 a2=0 a3=7ffd5cc1393c items=0 ppid=1673 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.056000 audit[1771]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.056000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd5cc13950 a2=0 a3=7ffd5cc1393c items=0 ppid=1673 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.058000 audit[1778]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.058000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe91e421a0 a2=0 a3=7ffe91e4218c items=0 ppid=1673 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:17.061000 audit[1780]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.061000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed1e1da80 a2=0 a3=7ffed1e1da6c items=0 ppid=1673 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:46:17.065000 audit[1783]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.065000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdcfb54200 a2=0 a3=7ffdcfb541ec items=0 ppid=1673 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:46:17.066000 audit[1784]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.066000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe716de6e0 a2=0 a3=7ffe716de6cc items=0 ppid=1673 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:17.069000 audit[1786]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.069000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdab7a02b0 a2=0 a3=7ffdab7a029c items=0 ppid=1673 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:17.070000 audit[1787]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.070000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf32c4fc0 a2=0 a3=7ffdf32c4fac items=0 ppid=1673 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:17.072000 audit[1789]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.072000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd98462e70 a2=0 a3=7ffd98462e5c items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:46:17.075000 audit[1792]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.075000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc8c93ea40 a2=0 a3=7ffc8c93ea2c items=0 ppid=1673 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:17.077000 audit[1793]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.077000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9d2ef0a0 a2=0 a3=7ffd9d2ef08c items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:17.079000 audit[1795]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.079000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0cce5ed0 a2=0 a3=7ffe0cce5ebc items=0 ppid=1673 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:17.080000 audit[1796]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.080000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce2acc40 a2=0 a3=7ffdce2acc2c items=0 ppid=1673 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:17.082000 audit[1798]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.082000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5b1bf290 a2=0 a3=7fff5b1bf27c items=0 ppid=1673 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:17.086000 audit[1801]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.086000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8a43aa10 a2=0 a3=7ffe8a43a9fc items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:17.089000 audit[1804]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.089000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee97d5ac0 a2=0 a3=7ffee97d5aac items=0 ppid=1673 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:46:17.090000 audit[1805]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.090000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5ecf0200 a2=0 a3=7ffd5ecf01ec items=0 ppid=1673 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:17.093000 audit[1807]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.093000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff77dc85c0 a2=0 a3=7fff77dc85ac items=0 ppid=1673 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:17.096000 audit[1810]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.096000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe631048d0 a2=0 a3=7ffe631048bc items=0 ppid=1673 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:17.097000 audit[1811]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.097000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7bba2120 a2=0 a3=7fff7bba210c items=0 ppid=1673 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:17.099000 audit[1813]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.099000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe199638d0 a2=0 a3=7ffe199638bc items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:17.100000 audit[1814]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.100000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd16c7f440 a2=0 a3=7ffd16c7f42c items=0 ppid=1673 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:46:17.103000 audit[1816]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.103000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde65cc710 a2=0 a3=7ffde65cc6fc items=0 ppid=1673 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:17.105000 audit[1819]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:17.105000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5f7a4d40 a2=0 a3=7ffd5f7a4d2c items=0 ppid=1673 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:17.108000 audit[1821]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:17.108000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff4a005710 a2=0 a3=7fff4a0056fc items=0 ppid=1673 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.108000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.108000 audit[1821]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:17.108000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4a005710 a2=0 a3=7fff4a0056fc items=0 ppid=1673 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.108000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.361895 kubelet[1446]: E0510 00:46:17.361858 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:17.577000 audit[1823]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.577000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc5cf5f3b0 a2=0 a3=7ffc5cf5f39c items=0 ppid=1673 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.584000 audit[1823]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.584000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc5cf5f3b0 a2=0 a3=0 items=0 ppid=1673 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.601086 kubelet[1446]: E0510 00:46:17.601038 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:18.336506 kubelet[1446]: E0510 00:46:18.336404 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:18.368245 kubelet[1446]: E0510 00:46:18.368174 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:18.597000 audit[1825]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:18.597000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffee12940f0 a2=0 a3=7ffee12940dc items=0 ppid=1673 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:18.597000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:18.601478 kubelet[1446]: E0510 00:46:18.601406 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:18.604000 audit[1825]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:18.604000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffee12940f0 a2=0 a3=7ffee12940dc items=0 ppid=1673 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:18.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:19.601917 kubelet[1446]: E0510 00:46:19.601841 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:20.336433 kubelet[1446]: E0510 00:46:20.336319 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:20.602697 kubelet[1446]: E0510 00:46:20.602508 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:21.603425 kubelet[1446]: E0510 00:46:21.603330 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:22.336492 kubelet[1446]: E0510 00:46:22.336426 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:22.604145 kubelet[1446]: E0510 00:46:22.603967 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:22.922000 audit[1829]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.924677 kernel: kauditd_printk_skb: 198 callbacks suppressed May 10 00:46:22.924754 kernel: audit: type=1325 audit(1746837982.922:524): table=filter:69 family=2 entries=10 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.922000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd6211a130 a2=0 a3=7ffd6211a11c items=0 ppid=1673 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.938686 kernel: audit: type=1300 audit(1746837982.922:524): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd6211a130 a2=0 a3=7ffd6211a11c items=0 ppid=1673 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.938749 kernel: audit: type=1327 audit(1746837982.922:524): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.942000 audit[1829]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.942000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd6211a130 a2=0 a3=7ffd6211a11c items=0 ppid=1673 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.951605 kernel: audit: type=1325 audit(1746837982.942:525): table=nat:70 family=2 entries=44 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.951694 kernel: audit: type=1300 audit(1746837982.942:525): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd6211a130 a2=0 a3=7ffd6211a11c items=0 ppid=1673 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.951728 kernel: audit: type=1327 audit(1746837982.942:525): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.978000 audit[1831]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.978000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd57df4880 a2=0 a3=7ffd57df486c items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.986852 kernel: audit: type=1325 audit(1746837982.978:526): table=filter:71 family=2 entries=10 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.986923 kernel: audit: type=1300 audit(1746837982.978:526): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd57df4880 a2=0 a3=7ffd57df486c items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.986944 kernel: audit: type=1327 audit(1746837982.978:526): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.993000 audit[1831]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.993000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd57df4880 a2=0 a3=7ffd57df486c items=0 ppid=1673 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.002092 kernel: audit: type=1325 audit(1746837982.993:527): table=nat:72 family=2 entries=20 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.267899 env[1202]: time="2025-05-10T00:46:23.267800333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.367004 env[1202]: time="2025-05-10T00:46:23.366913782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.396262 env[1202]: time="2025-05-10T00:46:23.396183092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.399040 env[1202]: time="2025-05-10T00:46:23.398941127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.399868 env[1202]: time="2025-05-10T00:46:23.399780806Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:46:23.402380 env[1202]: time="2025-05-10T00:46:23.402311745Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:46:23.605495 kubelet[1446]: E0510 00:46:23.605355 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:23.648171 env[1202]: time="2025-05-10T00:46:23.648080573Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9\"" May 10 00:46:23.648604 env[1202]: time="2025-05-10T00:46:23.648550203Z" level=info msg="StartContainer for \"d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9\"" May 10 00:46:23.669522 systemd[1]: Started cri-containerd-d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9.scope. May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f11bdeac8e8 items=0 ppid=1516 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383666373865653232316130363537393565366135663161393334 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.682000 audit: BPF prog-id=69 op=LOAD May 10 00:46:23.682000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00032dbd8 items=0 ppid=1516 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383666373865653232316130363537393565366135663161393334 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit: BPF prog-id=70 op=LOAD May 10 00:46:23.683000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00032dc28 items=0 ppid=1516 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383666373865653232316130363537393565366135663161393334 May 10 00:46:23.683000 audit: BPF prog-id=70 op=UNLOAD May 10 00:46:23.683000 audit: BPF prog-id=69 op=UNLOAD May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.683000 audit: BPF prog-id=71 op=LOAD May 10 00:46:23.683000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00032dcb8 items=0 ppid=1516 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383666373865653232316130363537393565366135663161393334 May 10 00:46:23.844731 env[1202]: time="2025-05-10T00:46:23.844662221Z" level=info msg="StartContainer for \"d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9\" returns successfully" May 10 00:46:24.010000 audit[1869]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:24.010000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd2cd11490 a2=0 a3=7ffd2cd1147c items=0 ppid=1673 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:24.199000 audit[1869]: NETFILTER_CFG table=nat:74 family=2 entries=56 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:24.199000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd2cd11490 a2=0 a3=7ffd2cd1147c items=0 ppid=1673 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:24.336316 kubelet[1446]: E0510 00:46:24.336159 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:24.379397 kubelet[1446]: E0510 00:46:24.379345 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:24.541488 kubelet[1446]: I0510 00:46:24.541407 1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6lc7w" podStartSLOduration=13.99689851 podStartE2EDuration="19.54137909s" podCreationTimestamp="2025-05-10 00:46:05 +0000 UTC" firstStartedPulling="2025-05-10 00:46:11.035106139 +0000 UTC m=+7.016380516" lastFinishedPulling="2025-05-10 00:46:16.579586719 +0000 UTC m=+12.560861096" observedRunningTime="2025-05-10 00:46:17.382506878 +0000 UTC m=+13.363781275" watchObservedRunningTime="2025-05-10 00:46:24.54137909 +0000 UTC m=+20.522653467" May 10 00:46:24.593729 kubelet[1446]: E0510 00:46:24.593601 1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:24.605957 kubelet[1446]: E0510 00:46:24.605909 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:24.708034 env[1202]: time="2025-05-10T00:46:24.707931603Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:46:24.709891 systemd[1]: cri-containerd-d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9.scope: Deactivated successfully. May 10 00:46:24.713000 audit: BPF prog-id=71 op=UNLOAD May 10 00:46:24.728293 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9-rootfs.mount: Deactivated successfully. May 10 00:46:24.744945 kubelet[1446]: I0510 00:46:24.744877 1446 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 00:46:25.215000 audit[1886]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:25.215000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd6dc73d80 a2=0 a3=7ffd6dc73d6c items=0 ppid=1673 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:25.223000 audit[1886]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:25.223000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd6dc73d80 a2=0 a3=7ffd6dc73d6c items=0 ppid=1673 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:25.381356 kubelet[1446]: E0510 00:46:25.381290 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:25.607094 kubelet[1446]: E0510 00:46:25.606998 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:25.612720 env[1202]: time="2025-05-10T00:46:25.612652996Z" level=info msg="shim disconnected" id=d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9 May 10 00:46:25.612818 env[1202]: time="2025-05-10T00:46:25.612736856Z" level=warning msg="cleaning up after shim disconnected" id=d786f78ee221a065795e6a5f1a9340f070297ef1fbf5d7c5610731b0b3f465f9 namespace=k8s.io May 10 00:46:25.612818 env[1202]: time="2025-05-10T00:46:25.612752285Z" level=info msg="cleaning up dead shim" May 10 00:46:25.619618 env[1202]: time="2025-05-10T00:46:25.619571828Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1887 runtime=io.containerd.runc.v2\n" May 10 00:46:26.343945 systemd[1]: Created slice kubepods-besteffort-podc7bafc47_1a33_4bd1_8f25_1a48cd1d990b.slice. May 10 00:46:26.346935 env[1202]: time="2025-05-10T00:46:26.346853992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xjwvd,Uid:c7bafc47-1a33-4bd1-8f25-1a48cd1d990b,Namespace:calico-system,Attempt:0,}" May 10 00:46:26.384496 kubelet[1446]: E0510 00:46:26.384448 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:26.385098 env[1202]: time="2025-05-10T00:46:26.385047921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:46:26.418037 env[1202]: time="2025-05-10T00:46:26.417903690Z" level=error msg="Failed to destroy network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:26.418397 env[1202]: time="2025-05-10T00:46:26.418360993Z" level=error msg="encountered an error cleaning up failed sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:26.418444 env[1202]: time="2025-05-10T00:46:26.418411439Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xjwvd,Uid:c7bafc47-1a33-4bd1-8f25-1a48cd1d990b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:26.419133 kubelet[1446]: E0510 00:46:26.418704 1446 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:26.419133 kubelet[1446]: E0510 00:46:26.418797 1446 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:26.419133 kubelet[1446]: E0510 00:46:26.418823 1446 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xjwvd" May 10 00:46:26.419273 kubelet[1446]: E0510 00:46:26.418868 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xjwvd_calico-system(c7bafc47-1a33-4bd1-8f25-1a48cd1d990b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xjwvd_calico-system(c7bafc47-1a33-4bd1-8f25-1a48cd1d990b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:26.420148 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa-shm.mount: Deactivated successfully. May 10 00:46:26.607343 kubelet[1446]: E0510 00:46:26.607179 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:26.842549 systemd[1]: Created slice kubepods-besteffort-pod5acfc581_85e1_4324_86da_9c769c7c2ace.slice. May 10 00:46:26.896709 kubelet[1446]: I0510 00:46:26.896567 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8r496\" (UniqueName: \"kubernetes.io/projected/5acfc581-85e1-4324-86da-9c769c7c2ace-kube-api-access-8r496\") pod \"nginx-deployment-8587fbcb89-ctpns\" (UID: \"5acfc581-85e1-4324-86da-9c769c7c2ace\") " pod="default/nginx-deployment-8587fbcb89-ctpns" May 10 00:46:27.145603 env[1202]: time="2025-05-10T00:46:27.145537757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-ctpns,Uid:5acfc581-85e1-4324-86da-9c769c7c2ace,Namespace:default,Attempt:0,}" May 10 00:46:27.387097 kubelet[1446]: I0510 00:46:27.387059 1446 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:27.387802 env[1202]: time="2025-05-10T00:46:27.387751626Z" level=info msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" May 10 00:46:27.411842 env[1202]: time="2025-05-10T00:46:27.411774433Z" level=error msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" failed" error="failed to destroy network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:27.412105 kubelet[1446]: E0510 00:46:27.412043 1446 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:27.412189 kubelet[1446]: E0510 00:46:27.412125 1446 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa"} May 10 00:46:27.412226 kubelet[1446]: E0510 00:46:27.412190 1446 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:27.412226 kubelet[1446]: E0510 00:46:27.412215 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xjwvd" podUID="c7bafc47-1a33-4bd1-8f25-1a48cd1d990b" May 10 00:46:27.566713 env[1202]: time="2025-05-10T00:46:27.566626959Z" level=error msg="Failed to destroy network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:27.567132 env[1202]: time="2025-05-10T00:46:27.567096014Z" level=error msg="encountered an error cleaning up failed sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:27.567189 env[1202]: time="2025-05-10T00:46:27.567158673Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-ctpns,Uid:5acfc581-85e1-4324-86da-9c769c7c2ace,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:27.567509 kubelet[1446]: E0510 00:46:27.567438 1446 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:27.567509 kubelet[1446]: E0510 00:46:27.567506 1446 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-ctpns" May 10 00:46:27.567738 kubelet[1446]: E0510 00:46:27.567525 1446 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-ctpns" May 10 00:46:27.567738 kubelet[1446]: E0510 00:46:27.567576 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-ctpns_default(5acfc581-85e1-4324-86da-9c769c7c2ace)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-ctpns_default(5acfc581-85e1-4324-86da-9c769c7c2ace)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-ctpns" podUID="5acfc581-85e1-4324-86da-9c769c7c2ace" May 10 00:46:27.568590 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff-shm.mount: Deactivated successfully. May 10 00:46:27.608380 kubelet[1446]: E0510 00:46:27.608318 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:28.390055 kubelet[1446]: I0510 00:46:28.389682 1446 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:28.390411 env[1202]: time="2025-05-10T00:46:28.390370775Z" level=info msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" May 10 00:46:28.426808 env[1202]: time="2025-05-10T00:46:28.426718714Z" level=error msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" failed" error="failed to destroy network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:28.427231 kubelet[1446]: E0510 00:46:28.427172 1446 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:28.427231 kubelet[1446]: E0510 00:46:28.427235 1446 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff"} May 10 00:46:28.427481 kubelet[1446]: E0510 00:46:28.427271 1446 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5acfc581-85e1-4324-86da-9c769c7c2ace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:28.427481 kubelet[1446]: E0510 00:46:28.427302 1446 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5acfc581-85e1-4324-86da-9c769c7c2ace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-ctpns" podUID="5acfc581-85e1-4324-86da-9c769c7c2ace" May 10 00:46:28.609177 kubelet[1446]: E0510 00:46:28.609099 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:29.609888 kubelet[1446]: E0510 00:46:29.609830 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:30.611391 kubelet[1446]: E0510 00:46:30.610828 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:31.612219 kubelet[1446]: E0510 00:46:31.612138 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:32.612451 kubelet[1446]: E0510 00:46:32.612378 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:33.613349 kubelet[1446]: E0510 00:46:33.613269 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:34.613489 kubelet[1446]: E0510 00:46:34.613418 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:35.613652 kubelet[1446]: E0510 00:46:35.613557 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:35.788288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount358945064.mount: Deactivated successfully. May 10 00:46:35.932188 update_engine[1194]: I0510 00:46:35.931973 1194 update_attempter.cc:509] Updating boot flags... May 10 00:46:36.542034 env[1202]: time="2025-05-10T00:46:36.541914332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:36.549790 env[1202]: time="2025-05-10T00:46:36.549712134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:36.553209 env[1202]: time="2025-05-10T00:46:36.553147979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:36.556669 env[1202]: time="2025-05-10T00:46:36.556621895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:36.556879 env[1202]: time="2025-05-10T00:46:36.556841901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:46:36.567892 env[1202]: time="2025-05-10T00:46:36.567826046Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:36.590360 env[1202]: time="2025-05-10T00:46:36.590292267Z" level=info msg="CreateContainer within sandbox \"3d0e174ba859b51e7d370c7ba184feb55b57056e5bc244adc082843d58ecc167\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a5681deb66c6d7867d17137b6eaba6cf6ffc2740cd4546c33de4610407fa3897\"" May 10 00:46:36.590919 env[1202]: time="2025-05-10T00:46:36.590879279Z" level=info msg="StartContainer for \"a5681deb66c6d7867d17137b6eaba6cf6ffc2740cd4546c33de4610407fa3897\"" May 10 00:46:36.608396 systemd[1]: Started cri-containerd-a5681deb66c6d7867d17137b6eaba6cf6ffc2740cd4546c33de4610407fa3897.scope. May 10 00:46:36.613912 kubelet[1446]: E0510 00:46:36.613850 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:36.623000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.640073 kernel: kauditd_printk_skb: 58 callbacks suppressed May 10 00:46:36.640232 kernel: audit: type=1400 audit(1746837996.623:539): avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.640262 kernel: audit: type=1300 audit(1746837996.623:539): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2fb758e018 items=0 ppid=1516 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.640286 kernel: audit: type=1327 audit(1746837996.623:539): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363831646562363663366437383637643137313337623665616261 May 10 00:46:36.623000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2fb758e018 items=0 ppid=1516 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363831646562363663366437383637643137313337623665616261 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.644160 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.644257 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.647691 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.654666 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.655461 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.658260 env[1202]: time="2025-05-10T00:46:36.658195125Z" level=info msg="StartContainer for \"a5681deb66c6d7867d17137b6eaba6cf6ffc2740cd4546c33de4610407fa3897\" returns successfully" May 10 00:46:36.624000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.662121 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.662211 kernel: audit: type=1400 audit(1746837996.624:540): avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.624000 audit: BPF prog-id=72 op=LOAD May 10 00:46:36.624000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001faf88 items=0 ppid=1516 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363831646562363663366437383637643137313337623665616261 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.628000 audit: BPF prog-id=73 op=LOAD May 10 00:46:36.628000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fafd8 items=0 ppid=1516 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363831646562363663366437383637643137313337623665616261 May 10 00:46:36.633000 audit: BPF prog-id=73 op=UNLOAD May 10 00:46:36.634000 audit: BPF prog-id=72 op=UNLOAD May 10 00:46:36.634000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:36.634000 audit: BPF prog-id=74 op=LOAD May 10 00:46:36.634000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb068 items=0 ppid=1516 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363831646562363663366437383637643137313337623665616261 May 10 00:46:36.746535 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:46:36.746716 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:46:37.409840 kubelet[1446]: E0510 00:46:37.409785 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:37.458457 kubelet[1446]: I0510 00:46:37.456273 1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wgwj2" podStartSLOduration=6.9305778369999995 podStartE2EDuration="32.456246734s" podCreationTimestamp="2025-05-10 00:46:05 +0000 UTC" firstStartedPulling="2025-05-10 00:46:11.032111532 +0000 UTC m=+7.013385909" lastFinishedPulling="2025-05-10 00:46:36.557780429 +0000 UTC m=+32.539054806" observedRunningTime="2025-05-10 00:46:37.456184396 +0000 UTC m=+33.437458793" watchObservedRunningTime="2025-05-10 00:46:37.456246734 +0000 UTC m=+33.437521111" May 10 00:46:37.614423 kubelet[1446]: E0510 00:46:37.614360 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:38.336251 env[1202]: time="2025-05-10T00:46:38.336162379Z" level=info msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" May 10 00:46:38.412539 kubelet[1446]: E0510 00:46:38.412490 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:38.504000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=18378 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.504000 audit[2228]: AVC avc: denied { write } for pid=2228 comm="tee" name="fd" dev="proc" ino=20621 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.504000 audit[2228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd071da2f a2=241 a3=1b6 items=1 ppid=2181 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.504000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:46:38.504000 audit: PATH item=0 name="/dev/fd/63" inode=18372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.504000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8526da2d a2=241 a3=1b6 items=1 ppid=2183 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.504000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:46:38.504000 audit: PATH item=0 name="/dev/fd/63" inode=20179 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.509000 audit[2237]: AVC avc: denied { write } for pid=2237 comm="tee" name="fd" dev="proc" ino=20625 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.509000 audit[2237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffa2bda1e a2=241 a3=1b6 items=1 ppid=2187 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.509000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:38.509000 audit: PATH item=0 name="/dev/fd/63" inode=20618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.542000 audit[2252]: AVC avc: denied { write } for pid=2252 comm="tee" name="fd" dev="proc" ino=21521 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.542000 audit[2252]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd54291a2d a2=241 a3=1b6 items=1 ppid=2190 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.542000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:46:38.542000 audit: PATH item=0 name="/dev/fd/63" inode=21515 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.542000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.543000 audit[2254]: AVC avc: denied { write } for pid=2254 comm="tee" name="fd" dev="proc" ino=21523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.543000 audit[2254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeadd5ea2d a2=241 a3=1b6 items=1 ppid=2189 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.543000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:46:38.543000 audit: PATH item=0 name="/dev/fd/63" inode=20185 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.553000 audit[2267]: AVC avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=21534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.553000 audit[2267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25b10a2e a2=241 a3=1b6 items=1 ppid=2182 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.553000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:46:38.553000 audit: PATH item=0 name="/dev/fd/63" inode=20192 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.553000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.558000 audit[2265]: AVC avc: denied { write } for pid=2265 comm="tee" name="fd" dev="proc" ino=20195 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:38.558000 audit[2265]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff33719a1d a2=241 a3=1b6 items=1 ppid=2196 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.558000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:46:38.558000 audit: PATH item=0 name="/dev/fd/63" inode=20189 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:38.558000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:38.615223 kubelet[1446]: E0510 00:46:38.615064 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" iface="eth0" netns="/var/run/netns/cni-53f9a9be-3c29-ddcf-dc34-7520cc46851b" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" iface="eth0" netns="/var/run/netns/cni-53f9a9be-3c29-ddcf-dc34-7520cc46851b" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" iface="eth0" netns="/var/run/netns/cni-53f9a9be-3c29-ddcf-dc34-7520cc46851b" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.507 [INFO][2143] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.594 [INFO][2243] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.594 [INFO][2243] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.594 [INFO][2243] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.632 [WARNING][2243] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.632 [INFO][2243] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.633 [INFO][2243] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:38.637600 env[1202]: 2025-05-10 00:46:38.636 [INFO][2143] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:46:38.638263 env[1202]: time="2025-05-10T00:46:38.637782675Z" level=info msg="TearDown network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" successfully" May 10 00:46:38.638263 env[1202]: time="2025-05-10T00:46:38.637821399Z" level=info msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" returns successfully" May 10 00:46:38.638697 env[1202]: time="2025-05-10T00:46:38.638657961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xjwvd,Uid:c7bafc47-1a33-4bd1-8f25-1a48cd1d990b,Namespace:calico-system,Attempt:1,}" May 10 00:46:38.639446 systemd[1]: run-netns-cni\x2d53f9a9be\x2d3c29\x2dddcf\x2ddc34\x2d7520cc46851b.mount: Deactivated successfully. May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit: BPF prog-id=75 op=LOAD May 10 00:46:38.685000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee850d6c0 a2=98 a3=3 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.685000 audit: BPF prog-id=75 op=UNLOAD May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit: BPF prog-id=76 op=LOAD May 10 00:46:38.685000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee850d4a0 a2=74 a3=540051 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.685000 audit: BPF prog-id=76 op=UNLOAD May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.685000 audit: BPF prog-id=77 op=LOAD May 10 00:46:38.685000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee850d4d0 a2=94 a3=2 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.685000 audit: BPF prog-id=77 op=UNLOAD May 10 00:46:38.804000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit: BPF prog-id=78 op=LOAD May 10 00:46:38.804000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee850d390 a2=40 a3=1 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.804000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.804000 audit: BPF prog-id=78 op=UNLOAD May 10 00:46:38.804000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.804000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee850d460 a2=50 a3=7ffee850d540 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.804000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d3a0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee850d3d0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee850d2e0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d3f0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d3d0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d3c0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d3f0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee850d3d0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee850d3f0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee850d3c0 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee850d430 a2=28 a3=0 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee850d1e0 a2=50 a3=1 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit: BPF prog-id=79 op=LOAD May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee850d1e0 a2=94 a3=5 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit: BPF prog-id=79 op=UNLOAD May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee850d290 a2=50 a3=1 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee850d3b0 a2=4 a3=38 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee850d400 a2=94 a3=6 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.812000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:38.812000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee850cbb0 a2=94 a3=83 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.813000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.813000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:38.813000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee850cbb0 a2=94 a3=83 items=0 ppid=2186 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit: BPF prog-id=80 op=LOAD May 10 00:46:38.820000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe05a4c400 a2=98 a3=1999999999999999 items=0 ppid=2186 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:38.820000 audit: BPF prog-id=80 op=UNLOAD May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit: BPF prog-id=81 op=LOAD May 10 00:46:38.820000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe05a4c2e0 a2=74 a3=ffff items=0 ppid=2186 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:38.820000 audit: BPF prog-id=81 op=UNLOAD May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.820000 audit: BPF prog-id=82 op=LOAD May 10 00:46:38.820000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe05a4c320 a2=40 a3=7ffe05a4c500 items=0 ppid=2186 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:38.820000 audit: BPF prog-id=82 op=UNLOAD May 10 00:46:38.868792 systemd-networkd[1024]: vxlan.calico: Link UP May 10 00:46:38.868803 systemd-networkd[1024]: vxlan.calico: Gained carrier May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit: BPF prog-id=83 op=LOAD May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac2c02f0 a2=98 a3=ffffffff items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit: BPF prog-id=83 op=UNLOAD May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit: BPF prog-id=84 op=LOAD May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac2c0100 a2=74 a3=540051 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit: BPF prog-id=84 op=UNLOAD May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit: BPF prog-id=85 op=LOAD May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac2c0130 a2=94 a3=2 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit: BPF prog-id=85 op=UNLOAD May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0000 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac2c0030 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac2bff40 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0050 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0030 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0020 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.887000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.887000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0050 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac2c0030 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac2c0050 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac2c0020 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac2c0090 a2=28 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit: BPF prog-id=86 op=LOAD May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac2bff00 a2=40 a3=0 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit: BPF prog-id=86 op=UNLOAD May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffac2bfef0 a2=50 a3=2800 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffac2bfef0 a2=50 a3=2800 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.888000 audit: BPF prog-id=87 op=LOAD May 10 00:46:38.888000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac2bf710 a2=94 a3=2 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.889000 audit: BPF prog-id=87 op=UNLOAD May 10 00:46:38.889000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.889000 audit: BPF prog-id=88 op=LOAD May 10 00:46:38.889000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac2bf810 a2=94 a3=30 items=0 ppid=2186 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit: BPF prog-id=89 op=LOAD May 10 00:46:38.892000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec9b0aaf0 a2=98 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.892000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:38.892000 audit: BPF prog-id=89 op=UNLOAD May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit: BPF prog-id=90 op=LOAD May 10 00:46:38.892000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec9b0a8d0 a2=74 a3=540051 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.892000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:38.892000 audit: BPF prog-id=90 op=UNLOAD May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.892000 audit: BPF prog-id=91 op=LOAD May 10 00:46:38.892000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec9b0a900 a2=94 a3=2 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.892000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:38.892000 audit: BPF prog-id=91 op=UNLOAD May 10 00:46:39.004000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit: BPF prog-id=92 op=LOAD May 10 00:46:39.004000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec9b0a7c0 a2=40 a3=1 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.004000 audit: BPF prog-id=92 op=UNLOAD May 10 00:46:39.004000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.004000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec9b0a890 a2=50 a3=7ffec9b0a970 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a7d0 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec9b0a800 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec9b0a710 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a820 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a800 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a7f0 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a820 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec9b0a800 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec9b0a820 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec9b0a7f0 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec9b0a860 a2=28 a3=0 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec9b0a610 a2=50 a3=1 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit: BPF prog-id=93 op=LOAD May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec9b0a610 a2=94 a3=5 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit: BPF prog-id=93 op=UNLOAD May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec9b0a6c0 a2=50 a3=1 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec9b0a7e0 a2=4 a3=38 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.012000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:39.012000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec9b0a830 a2=94 a3=6 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec9b09fe0 a2=94 a3=83 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec9b09fe0 a2=94 a3=83 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec9b0ba20 a2=10 a3=208 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec9b0b8c0 a2=10 a3=3 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec9b0b860 a2=10 a3=3 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.013000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.013000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec9b0b860 a2=10 a3=7 items=0 ppid=2186 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:39.020000 audit: BPF prog-id=88 op=UNLOAD May 10 00:46:39.061134 systemd-networkd[1024]: calid00500f25c7: Link UP May 10 00:46:39.063050 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid00500f25c7: link becomes ready May 10 00:46:39.063107 systemd-networkd[1024]: calid00500f25c7: Gained carrier May 10 00:46:39.073000 audit[2386]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:39.073000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcbbcd9e40 a2=0 a3=7ffcbbcd9e2c items=0 ppid=2186 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.073000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:39.079000 audit[2387]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:39.079000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd8376f640 a2=0 a3=7ffd8376f62c items=0 ppid=2186 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:39.083000 audit[2392]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:39.083000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe275e31b0 a2=0 a3=7ffe275e319c items=0 ppid=2186 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.083000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:39.088000 audit[2391]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:39.088000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe396891e0 a2=0 a3=7ffe396891cc items=0 ppid=2186 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.088000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.712 [INFO][2304] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.129-k8s-csi--node--driver--xjwvd-eth0 csi-node-driver- calico-system c7bafc47-1a33-4bd1-8f25-1a48cd1d990b 1110 0 2025-05-10 00:46:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.129 csi-node-driver-xjwvd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid00500f25c7 [] []}} ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.712 [INFO][2304] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.739 [INFO][2325] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" HandleID="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.852 [INFO][2325] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" HandleID="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00059bb80), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.129", "pod":"csi-node-driver-xjwvd", "timestamp":"2025-05-10 00:46:38.739126417 +0000 UTC"}, Hostname:"10.0.0.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.852 [INFO][2325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.852 [INFO][2325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.852 [INFO][2325] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.129' May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.855 [INFO][2325] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.861 [INFO][2325] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.869 [INFO][2325] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.873 [INFO][2325] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.876 [INFO][2325] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.880 [INFO][2325] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.886 [INFO][2325] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:38.931 [INFO][2325] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:39.057 [INFO][2325] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.193/26] block=192.168.20.192/26 handle="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:39.057 [INFO][2325] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.193/26] handle="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" host="10.0.0.129" May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:39.057 [INFO][2325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:39.100132 env[1202]: 2025-05-10 00:46:39.057 [INFO][2325] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.193/26] IPv6=[] ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" HandleID="k8s-pod-network.52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.059 [INFO][2304] cni-plugin/k8s.go 386: Populated endpoint ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-csi--node--driver--xjwvd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"", Pod:"csi-node-driver-xjwvd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid00500f25c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.059 [INFO][2304] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.193/32] ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.059 [INFO][2304] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid00500f25c7 ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.063 [INFO][2304] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.063 [INFO][2304] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-csi--node--driver--xjwvd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b", Pod:"csi-node-driver-xjwvd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid00500f25c7", MAC:"d2:b8:ab:d4:b1:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:39.100959 env[1202]: 2025-05-10 00:46:39.098 [INFO][2304] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b" Namespace="calico-system" Pod="csi-node-driver-xjwvd" WorkloadEndpoint="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:46:39.107000 audit[2412]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:39.107000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcaffc6250 a2=0 a3=7ffcaffc623c items=0 ppid=2186 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:39.276302 env[1202]: time="2025-05-10T00:46:39.276174016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:39.276302 env[1202]: time="2025-05-10T00:46:39.276247114Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:39.276302 env[1202]: time="2025-05-10T00:46:39.276259146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:39.276580 env[1202]: time="2025-05-10T00:46:39.276439778Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b pid=2420 runtime=io.containerd.runc.v2 May 10 00:46:39.290629 systemd[1]: Started cri-containerd-52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b.scope. May 10 00:46:39.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit: BPF prog-id=94 op=LOAD May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2420 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613264666264366234633964613861313637366661396431643062 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2420 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613264666264366234633964613861313637366661396431643062 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit: BPF prog-id=95 op=LOAD May 10 00:46:39.305000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025100 items=0 ppid=2420 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613264666264366234633964613861313637366661396431643062 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.305000 audit: BPF prog-id=96 op=LOAD May 10 00:46:39.305000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025148 items=0 ppid=2420 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613264666264366234633964613861313637366661396431643062 May 10 00:46:39.306000 audit: BPF prog-id=96 op=UNLOAD May 10 00:46:39.306000 audit: BPF prog-id=95 op=UNLOAD May 10 00:46:39.306000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:39.306000 audit: BPF prog-id=97 op=LOAD May 10 00:46:39.306000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025558 items=0 ppid=2420 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:39.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613264666264366234633964613861313637366661396431643062 May 10 00:46:39.307926 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:39.318916 env[1202]: time="2025-05-10T00:46:39.318849084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xjwvd,Uid:c7bafc47-1a33-4bd1-8f25-1a48cd1d990b,Namespace:calico-system,Attempt:1,} returns sandbox id \"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b\"" May 10 00:46:39.321076 env[1202]: time="2025-05-10T00:46:39.320997825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:46:39.615500 kubelet[1446]: E0510 00:46:39.615342 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:40.458402 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL May 10 00:46:40.616553 kubelet[1446]: E0510 00:46:40.616373 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:40.979043 env[1202]: time="2025-05-10T00:46:40.978950557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:40.980768 env[1202]: time="2025-05-10T00:46:40.980719479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:40.982075 env[1202]: time="2025-05-10T00:46:40.982039332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:40.983449 env[1202]: time="2025-05-10T00:46:40.983410452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:40.983894 env[1202]: time="2025-05-10T00:46:40.983844141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:46:40.985770 env[1202]: time="2025-05-10T00:46:40.985738501Z" level=info msg="CreateContainer within sandbox \"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:46:41.001699 env[1202]: time="2025-05-10T00:46:41.001649920Z" level=info msg="CreateContainer within sandbox \"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"626da14dab48b79c727d0925d116a96f86fc836283803e279bb0c80860bc57a0\"" May 10 00:46:41.002153 env[1202]: time="2025-05-10T00:46:41.002114005Z" level=info msg="StartContainer for \"626da14dab48b79c727d0925d116a96f86fc836283803e279bb0c80860bc57a0\"" May 10 00:46:41.020503 systemd[1]: run-containerd-runc-k8s.io-626da14dab48b79c727d0925d116a96f86fc836283803e279bb0c80860bc57a0-runc.YLgaXL.mount: Deactivated successfully. May 10 00:46:41.025433 systemd[1]: Started cri-containerd-626da14dab48b79c727d0925d116a96f86fc836283803e279bb0c80860bc57a0.scope. May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f57e8f8c598 items=0 ppid=2420 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366461313464616234386237396337323764303932356431313661 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit: BPF prog-id=98 op=LOAD May 10 00:46:41.037000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000efeb8 items=0 ppid=2420 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366461313464616234386237396337323764303932356431313661 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit: BPF prog-id=99 op=LOAD May 10 00:46:41.037000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000eff08 items=0 ppid=2420 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366461313464616234386237396337323764303932356431313661 May 10 00:46:41.037000 audit: BPF prog-id=99 op=UNLOAD May 10 00:46:41.037000 audit: BPF prog-id=98 op=UNLOAD May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.037000 audit: BPF prog-id=100 op=LOAD May 10 00:46:41.037000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000eff98 items=0 ppid=2420 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366461313464616234386237396337323764303932356431313661 May 10 00:46:41.098212 systemd-networkd[1024]: calid00500f25c7: Gained IPv6LL May 10 00:46:41.309105 env[1202]: time="2025-05-10T00:46:41.309036592Z" level=info msg="StartContainer for \"626da14dab48b79c727d0925d116a96f86fc836283803e279bb0c80860bc57a0\" returns successfully" May 10 00:46:41.310562 env[1202]: time="2025-05-10T00:46:41.310524932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:46:41.617629 kubelet[1446]: E0510 00:46:41.617480 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:42.617867 kubelet[1446]: E0510 00:46:42.617768 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:43.337117 env[1202]: time="2025-05-10T00:46:43.336943745Z" level=info msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.509 [INFO][2508] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.509 [INFO][2508] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" iface="eth0" netns="/var/run/netns/cni-1c51e67a-98f1-dfb2-5081-7e403ed578b7" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.510 [INFO][2508] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" iface="eth0" netns="/var/run/netns/cni-1c51e67a-98f1-dfb2-5081-7e403ed578b7" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.510 [INFO][2508] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" iface="eth0" netns="/var/run/netns/cni-1c51e67a-98f1-dfb2-5081-7e403ed578b7" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.510 [INFO][2508] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.510 [INFO][2508] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.530 [INFO][2517] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.530 [INFO][2517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.531 [INFO][2517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.536 [WARNING][2517] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.536 [INFO][2517] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.538 [INFO][2517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:43.541376 env[1202]: 2025-05-10 00:46:43.540 [INFO][2508] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:46:43.541912 env[1202]: time="2025-05-10T00:46:43.541696020Z" level=info msg="TearDown network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" successfully" May 10 00:46:43.541912 env[1202]: time="2025-05-10T00:46:43.541740123Z" level=info msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" returns successfully" May 10 00:46:43.543381 env[1202]: time="2025-05-10T00:46:43.543315776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-ctpns,Uid:5acfc581-85e1-4324-86da-9c769c7c2ace,Namespace:default,Attempt:1,}" May 10 00:46:43.543489 systemd[1]: run-netns-cni\x2d1c51e67a\x2d98f1\x2ddfb2\x2d5081\x2d7e403ed578b7.mount: Deactivated successfully. May 10 00:46:43.618251 kubelet[1446]: E0510 00:46:43.618090 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:43.729142 systemd-networkd[1024]: cali757862d9277: Link UP May 10 00:46:43.732267 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:43.732329 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali757862d9277: link becomes ready May 10 00:46:43.732252 systemd-networkd[1024]: cali757862d9277: Gained carrier May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.665 [INFO][2524] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0 nginx-deployment-8587fbcb89- default 5acfc581-85e1-4324-86da-9c769c7c2ace 1137 0 2025-05-10 00:46:26 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.129 nginx-deployment-8587fbcb89-ctpns eth0 default [] [] [kns.default ksa.default.default] cali757862d9277 [] []}} ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.665 [INFO][2524] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.692 [INFO][2539] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" HandleID="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.700 [INFO][2539] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" HandleID="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003641b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.129", "pod":"nginx-deployment-8587fbcb89-ctpns", "timestamp":"2025-05-10 00:46:43.692235326 +0000 UTC"}, Hostname:"10.0.0.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.700 [INFO][2539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.700 [INFO][2539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.700 [INFO][2539] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.129' May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.703 [INFO][2539] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.706 [INFO][2539] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.710 [INFO][2539] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.712 [INFO][2539] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.714 [INFO][2539] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.714 [INFO][2539] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.715 [INFO][2539] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.718 [INFO][2539] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.724 [INFO][2539] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.194/26] block=192.168.20.192/26 handle="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.724 [INFO][2539] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.194/26] handle="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" host="10.0.0.129" May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.724 [INFO][2539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:43.743690 env[1202]: 2025-05-10 00:46:43.724 [INFO][2539] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.194/26] IPv6=[] ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" HandleID="k8s-pod-network.9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.726 [INFO][2524] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5acfc581-85e1-4324-86da-9c769c7c2ace", ResourceVersion:"1137", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-ctpns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali757862d9277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.726 [INFO][2524] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.194/32] ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.726 [INFO][2524] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali757862d9277 ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.732 [INFO][2524] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.732 [INFO][2524] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5acfc581-85e1-4324-86da-9c769c7c2ace", ResourceVersion:"1137", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e", Pod:"nginx-deployment-8587fbcb89-ctpns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali757862d9277", MAC:"d6:3f:4d:32:32:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:43.744689 env[1202]: 2025-05-10 00:46:43.739 [INFO][2524] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e" Namespace="default" Pod="nginx-deployment-8587fbcb89-ctpns" WorkloadEndpoint="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:46:43.749000 audit[2557]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.754339 kernel: kauditd_printk_skb: 651 callbacks suppressed May 10 00:46:43.754410 kernel: audit: type=1325 audit(1746838003.749:672): table=filter:82 family=2 entries=38 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.754442 kernel: audit: type=1300 audit(1746838003.749:672): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcd31f72a0 a2=0 a3=7ffcd31f728c items=0 ppid=2186 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.749000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcd31f72a0 a2=0 a3=7ffcd31f728c items=0 ppid=2186 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.749000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:43.762186 kernel: audit: type=1327 audit(1746838003.749:672): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:43.772690 env[1202]: time="2025-05-10T00:46:43.772612921Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:43.772945 env[1202]: time="2025-05-10T00:46:43.772912978Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:43.773098 env[1202]: time="2025-05-10T00:46:43.773064193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:43.773480 env[1202]: time="2025-05-10T00:46:43.773383225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e pid=2570 runtime=io.containerd.runc.v2 May 10 00:46:43.792562 systemd[1]: Started cri-containerd-9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e.scope. May 10 00:46:43.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820935 kernel: audit: type=1400 audit(1746838003.806:673): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.821005 kernel: audit: type=1400 audit(1746838003.806:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.821045 kernel: audit: type=1400 audit(1746838003.806:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.821070 kernel: audit: type=1400 audit(1746838003.806:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.825070 kernel: audit: type=1400 audit(1746838003.806:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.825123 kernel: audit: type=1400 audit(1746838003.806:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.831512 kernel: audit: type=1400 audit(1746838003.806:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.831550 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:43.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit: BPF prog-id=101 op=LOAD May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353963663637393033643464393933336234373635353134663837 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353963663637393033643464393933336234373635353134663837 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.810000 audit: BPF prog-id=102 op=LOAD May 10 00:46:43.810000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000188e50 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353963663637393033643464393933336234373635353134663837 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.813000 audit: BPF prog-id=103 op=LOAD May 10 00:46:43.813000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000188e98 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353963663637393033643464393933336234373635353134663837 May 10 00:46:43.820000 audit: BPF prog-id=103 op=UNLOAD May 10 00:46:43.820000 audit: BPF prog-id=102 op=UNLOAD May 10 00:46:43.820000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.820000 audit: BPF prog-id=104 op=LOAD May 10 00:46:43.820000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001892a8 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353963663637393033643464393933336234373635353134663837 May 10 00:46:43.857441 env[1202]: time="2025-05-10T00:46:43.856803031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-ctpns,Uid:5acfc581-85e1-4324-86da-9c769c7c2ace,Namespace:default,Attempt:1,} returns sandbox id \"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e\"" May 10 00:46:43.959710 env[1202]: time="2025-05-10T00:46:43.959542278Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:43.961921 env[1202]: time="2025-05-10T00:46:43.961884878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:43.963545 env[1202]: time="2025-05-10T00:46:43.963508822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:43.965034 env[1202]: time="2025-05-10T00:46:43.964985789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:43.965574 env[1202]: time="2025-05-10T00:46:43.965517793Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:46:43.966807 env[1202]: time="2025-05-10T00:46:43.966767240Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:46:43.968178 env[1202]: time="2025-05-10T00:46:43.968137455Z" level=info msg="CreateContainer within sandbox \"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:46:43.985480 env[1202]: time="2025-05-10T00:46:43.985406529Z" level=info msg="CreateContainer within sandbox \"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"868335798aa4e7a304ac66b8927cf31f57a4ce89f3cee45b01e8ea5b51ea942a\"" May 10 00:46:43.986663 env[1202]: time="2025-05-10T00:46:43.986617092Z" level=info msg="StartContainer for \"868335798aa4e7a304ac66b8927cf31f57a4ce89f3cee45b01e8ea5b51ea942a\"" May 10 00:46:44.004312 systemd[1]: Started cri-containerd-868335798aa4e7a304ac66b8927cf31f57a4ce89f3cee45b01e8ea5b51ea942a.scope. May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe225a57d58 items=0 ppid=2420 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383333353739386161346537613330346163363662383932376366 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.019000 audit: BPF prog-id=105 op=LOAD May 10 00:46:44.019000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=2420 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383333353739386161346537613330346163363662383932376366 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit: BPF prog-id=106 op=LOAD May 10 00:46:44.020000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=2420 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383333353739386161346537613330346163363662383932376366 May 10 00:46:44.020000 audit: BPF prog-id=106 op=UNLOAD May 10 00:46:44.020000 audit: BPF prog-id=105 op=UNLOAD May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:44.020000 audit: BPF prog-id=107 op=LOAD May 10 00:46:44.020000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=2420 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383333353739386161346537613330346163363662383932376366 May 10 00:46:44.034389 env[1202]: time="2025-05-10T00:46:44.034323642Z" level=info msg="StartContainer for \"868335798aa4e7a304ac66b8927cf31f57a4ce89f3cee45b01e8ea5b51ea942a\" returns successfully" May 10 00:46:44.306778 kubelet[1446]: I0510 00:46:44.306724 1446 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:46:44.306778 kubelet[1446]: I0510 00:46:44.306778 1446 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:46:44.486229 kubelet[1446]: I0510 00:46:44.486150 1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xjwvd" podStartSLOduration=34.840022167 podStartE2EDuration="39.486129011s" podCreationTimestamp="2025-05-10 00:46:05 +0000 UTC" firstStartedPulling="2025-05-10 00:46:39.320457313 +0000 UTC m=+35.301731690" lastFinishedPulling="2025-05-10 00:46:43.966564157 +0000 UTC m=+39.947838534" observedRunningTime="2025-05-10 00:46:44.485944493 +0000 UTC m=+40.467218880" watchObservedRunningTime="2025-05-10 00:46:44.486129011 +0000 UTC m=+40.467403408" May 10 00:46:44.544353 systemd[1]: run-containerd-runc-k8s.io-9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e-runc.zJQpkP.mount: Deactivated successfully. May 10 00:46:44.593780 kubelet[1446]: E0510 00:46:44.593613 1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:44.619238 kubelet[1446]: E0510 00:46:44.619187 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:45.620153 kubelet[1446]: E0510 00:46:45.620090 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:45.642592 systemd-networkd[1024]: cali757862d9277: Gained IPv6LL May 10 00:46:46.620921 kubelet[1446]: E0510 00:46:46.620832 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:47.621671 kubelet[1446]: E0510 00:46:47.621603 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:48.065348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2691627176.mount: Deactivated successfully. May 10 00:46:48.622609 kubelet[1446]: E0510 00:46:48.622554 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:49.622726 kubelet[1446]: E0510 00:46:49.622652 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:50.623365 kubelet[1446]: E0510 00:46:50.623301 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:51.496000 audit[2661]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.499292 kernel: kauditd_printk_skb: 93 callbacks suppressed May 10 00:46:51.499358 kernel: audit: type=1325 audit(1746838011.496:697): table=filter:83 family=2 entries=8 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.496000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd6b6ae60 a2=0 a3=7fffd6b6ae4c items=0 ppid=1673 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.518171 kernel: audit: type=1300 audit(1746838011.496:697): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd6b6ae60 a2=0 a3=7fffd6b6ae4c items=0 ppid=1673 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.518346 kernel: audit: type=1327 audit(1746838011.496:697): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:51.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:51.522000 audit[2661]: NETFILTER_CFG table=nat:84 family=2 entries=34 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.522000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd6b6ae60 a2=0 a3=7fffd6b6ae4c items=0 ppid=1673 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.530984 kernel: audit: type=1325 audit(1746838011.522:698): table=nat:84 family=2 entries=34 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.531142 kernel: audit: type=1300 audit(1746838011.522:698): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd6b6ae60 a2=0 a3=7fffd6b6ae4c items=0 ppid=1673 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.531175 kernel: audit: type=1327 audit(1746838011.522:698): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:51.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:51.624198 kubelet[1446]: E0510 00:46:51.624103 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:51.741428 env[1202]: time="2025-05-10T00:46:51.741340851Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.746433 env[1202]: time="2025-05-10T00:46:51.746365208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.748375 env[1202]: time="2025-05-10T00:46:51.748251819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.750239 env[1202]: time="2025-05-10T00:46:51.750174839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.751232 env[1202]: time="2025-05-10T00:46:51.751190310Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:46:51.753597 env[1202]: time="2025-05-10T00:46:51.753555743Z" level=info msg="CreateContainer within sandbox \"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 00:46:51.768738 env[1202]: time="2025-05-10T00:46:51.768665885Z" level=info msg="CreateContainer within sandbox \"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d3836bec3ee614e046d061ab3299c511d857130a13b9117baccef7bac2d9f0a8\"" May 10 00:46:51.769406 env[1202]: time="2025-05-10T00:46:51.769340495Z" level=info msg="StartContainer for \"d3836bec3ee614e046d061ab3299c511d857130a13b9117baccef7bac2d9f0a8\"" May 10 00:46:51.792142 systemd[1]: Started cri-containerd-d3836bec3ee614e046d061ab3299c511d857130a13b9117baccef7bac2d9f0a8.scope. May 10 00:46:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.811173 kernel: audit: type=1400 audit(1746838011.803:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.811288 kernel: audit: type=1400 audit(1746838011.803:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.811317 kernel: audit: type=1400 audit(1746838011.803:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.825292 kernel: audit: type=1400 audit(1746838011.803:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit: BPF prog-id=108 op=LOAD May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2570 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383336626563336565363134653034366430363161623332393963 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2570 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383336626563336565363134653034366430363161623332393963 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.810000 audit: BPF prog-id=109 op=LOAD May 10 00:46:51.810000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002014a0 items=0 ppid=2570 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383336626563336565363134653034366430363161623332393963 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.813000 audit: BPF prog-id=110 op=LOAD May 10 00:46:51.813000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002014e8 items=0 ppid=2570 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383336626563336565363134653034366430363161623332393963 May 10 00:46:51.824000 audit: BPF prog-id=110 op=UNLOAD May 10 00:46:51.824000 audit: BPF prog-id=109 op=UNLOAD May 10 00:46:51.824000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.824000 audit: BPF prog-id=111 op=LOAD May 10 00:46:51.824000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002018f8 items=0 ppid=2570 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383336626563336565363134653034366430363161623332393963 May 10 00:46:51.848128 env[1202]: time="2025-05-10T00:46:51.847891804Z" level=info msg="StartContainer for \"d3836bec3ee614e046d061ab3299c511d857130a13b9117baccef7bac2d9f0a8\" returns successfully" May 10 00:46:52.498192 kubelet[1446]: I0510 00:46:52.498101 1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-ctpns" podStartSLOduration=18.604420923 podStartE2EDuration="26.498075956s" podCreationTimestamp="2025-05-10 00:46:26 +0000 UTC" firstStartedPulling="2025-05-10 00:46:43.858543474 +0000 UTC m=+39.839817852" lastFinishedPulling="2025-05-10 00:46:51.752198508 +0000 UTC m=+47.733472885" observedRunningTime="2025-05-10 00:46:52.498001946 +0000 UTC m=+48.479276324" watchObservedRunningTime="2025-05-10 00:46:52.498075956 +0000 UTC m=+48.479350363" May 10 00:46:52.625396 kubelet[1446]: E0510 00:46:52.625305 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:53.625901 kubelet[1446]: E0510 00:46:53.625832 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:54.626720 kubelet[1446]: E0510 00:46:54.626662 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:55.627857 kubelet[1446]: E0510 00:46:55.627790 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:55.870000 audit[2721]: NETFILTER_CFG table=filter:85 family=2 entries=20 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.870000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd13755380 a2=0 a3=7ffd1375536c items=0 ppid=1673 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.878000 audit[2721]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.878000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd13755380 a2=0 a3=0 items=0 ppid=1673 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.903000 audit[2723]: NETFILTER_CFG table=filter:87 family=2 entries=32 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.903000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffca802cd50 a2=0 a3=7ffca802cd3c items=0 ppid=1673 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.909000 audit[2723]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.909000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffca802cd50 a2=0 a3=0 items=0 ppid=1673 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.933153 systemd[1]: Created slice kubepods-besteffort-pod84def2d9_820a_4b57_96be_f737c4654f1a.slice. May 10 00:46:55.992560 kubelet[1446]: I0510 00:46:55.992480 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/84def2d9-820a-4b57-96be-f737c4654f1a-data\") pod \"nfs-server-provisioner-0\" (UID: \"84def2d9-820a-4b57-96be-f737c4654f1a\") " pod="default/nfs-server-provisioner-0" May 10 00:46:55.992801 kubelet[1446]: I0510 00:46:55.992603 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktptb\" (UniqueName: \"kubernetes.io/projected/84def2d9-820a-4b57-96be-f737c4654f1a-kube-api-access-ktptb\") pod \"nfs-server-provisioner-0\" (UID: \"84def2d9-820a-4b57-96be-f737c4654f1a\") " pod="default/nfs-server-provisioner-0" May 10 00:46:56.236586 env[1202]: time="2025-05-10T00:46:56.236538802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:84def2d9-820a-4b57-96be-f737c4654f1a,Namespace:default,Attempt:0,}" May 10 00:46:56.622335 systemd-networkd[1024]: cali60e51b789ff: Link UP May 10 00:46:56.625515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:56.625632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 00:46:56.625694 systemd-networkd[1024]: cali60e51b789ff: Gained carrier May 10 00:46:56.628972 kubelet[1446]: E0510 00:46:56.628912 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.420 [INFO][2725] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.129-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 84def2d9-820a-4b57-96be-f737c4654f1a 1212 0 2025-05-10 00:46:55 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.129 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.420 [INFO][2725] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.448 [INFO][2741] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" HandleID="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Workload="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.458 [INFO][2741] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" HandleID="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Workload="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df3d0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.129", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 00:46:56.448287255 +0000 UTC"}, Hostname:"10.0.0.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.459 [INFO][2741] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.459 [INFO][2741] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.459 [INFO][2741] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.129' May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.461 [INFO][2741] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.465 [INFO][2741] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.471 [INFO][2741] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.473 [INFO][2741] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.476 [INFO][2741] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.476 [INFO][2741] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.478 [INFO][2741] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.583 [INFO][2741] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.617 [INFO][2741] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.195/26] block=192.168.20.192/26 handle="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.617 [INFO][2741] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.195/26] handle="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" host="10.0.0.129" May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.617 [INFO][2741] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:56.707330 env[1202]: 2025-05-10 00:46:56.617 [INFO][2741] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.195/26] IPv6=[] ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" HandleID="k8s-pod-network.ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Workload="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.708059 env[1202]: 2025-05-10 00:46:56.619 [INFO][2725] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"84def2d9-820a-4b57-96be-f737c4654f1a", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:56.708059 env[1202]: 2025-05-10 00:46:56.619 [INFO][2725] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.195/32] ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.708059 env[1202]: 2025-05-10 00:46:56.619 [INFO][2725] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.708059 env[1202]: 2025-05-10 00:46:56.625 [INFO][2725] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.708223 env[1202]: 2025-05-10 00:46:56.626 [INFO][2725] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"84def2d9-820a-4b57-96be-f737c4654f1a", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a6:c0:61:58:d4:f8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:56.708223 env[1202]: 2025-05-10 00:46:56.705 [INFO][2725] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.129-k8s-nfs--server--provisioner--0-eth0" May 10 00:46:56.716000 audit[2765]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:56.722436 kernel: kauditd_printk_skb: 65 callbacks suppressed May 10 00:46:56.722499 kernel: audit: type=1325 audit(1746838016.716:721): table=filter:89 family=2 entries=38 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:56.716000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd79a188f0 a2=0 a3=7ffd79a188dc items=0 ppid=2186 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.729443 kernel: audit: type=1300 audit(1746838016.716:721): arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd79a188f0 a2=0 a3=7ffd79a188dc items=0 ppid=2186 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.729568 kernel: audit: type=1327 audit(1746838016.716:721): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:56.716000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:56.754226 env[1202]: time="2025-05-10T00:46:56.754137978Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:56.754226 env[1202]: time="2025-05-10T00:46:56.754177933Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:56.754226 env[1202]: time="2025-05-10T00:46:56.754188042Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:56.754458 env[1202]: time="2025-05-10T00:46:56.754320030Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f pid=2773 runtime=io.containerd.runc.v2 May 10 00:46:56.769532 systemd[1]: Started cri-containerd-ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f.scope. May 10 00:46:56.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818241 kernel: audit: type=1400 audit(1746838016.781:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818347 kernel: audit: type=1400 audit(1746838016.781:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818374 kernel: audit: type=1400 audit(1746838016.781:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.824240 kernel: audit: type=1400 audit(1746838016.781:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.824288 kernel: audit: type=1400 audit(1746838016.781:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.827443 kernel: audit: type=1400 audit(1746838016.781:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.850141 kernel: audit: type=1400 audit(1746838016.781:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.817000 audit: BPF prog-id=112 op=LOAD May 10 00:46:56.817000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.817000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2773 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353230356565336337633665643837356438356439393936356633 May 10 00:46:56.817000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.817000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2773 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353230356565336337633665643837356438356439393936356633 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.818000 audit: BPF prog-id=113 op=LOAD May 10 00:46:56.818000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001a3c20 items=0 ppid=2773 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353230356565336337633665643837356438356439393936356633 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.826000 audit: BPF prog-id=114 op=LOAD May 10 00:46:56.826000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001a3c68 items=0 ppid=2773 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353230356565336337633665643837356438356439393936356633 May 10 00:46:56.829000 audit: BPF prog-id=114 op=UNLOAD May 10 00:46:56.829000 audit: BPF prog-id=113 op=UNLOAD May 10 00:46:56.829000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:56.829000 audit: BPF prog-id=115 op=LOAD May 10 00:46:56.829000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000396078 items=0 ppid=2773 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353230356565336337633665643837356438356439393936356633 May 10 00:46:56.850876 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:56.876262 env[1202]: time="2025-05-10T00:46:56.873752502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:84def2d9-820a-4b57-96be-f737c4654f1a,Namespace:default,Attempt:0,} returns sandbox id \"ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f\"" May 10 00:46:56.876262 env[1202]: time="2025-05-10T00:46:56.875885924Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 00:46:57.102920 systemd[1]: run-containerd-runc-k8s.io-ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f-runc.xugAON.mount: Deactivated successfully. May 10 00:46:57.629234 kubelet[1446]: E0510 00:46:57.629169 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:57.740131 systemd-networkd[1024]: cali60e51b789ff: Gained IPv6LL May 10 00:46:58.630268 kubelet[1446]: E0510 00:46:58.630193 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:59.631279 kubelet[1446]: E0510 00:46:59.631194 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:00.083715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4213135566.mount: Deactivated successfully. May 10 00:47:00.632161 kubelet[1446]: E0510 00:47:00.632100 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:01.632489 kubelet[1446]: E0510 00:47:01.632407 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:02.633201 kubelet[1446]: E0510 00:47:02.633134 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:02.759962 kubelet[1446]: E0510 00:47:02.759922 1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:03.633858 kubelet[1446]: E0510 00:47:03.633761 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:03.655276 env[1202]: time="2025-05-10T00:47:03.655172073Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:03.657824 env[1202]: time="2025-05-10T00:47:03.657765716Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:03.660603 env[1202]: time="2025-05-10T00:47:03.660558714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:03.663743 env[1202]: time="2025-05-10T00:47:03.663680478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:03.664313 env[1202]: time="2025-05-10T00:47:03.664280125Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 00:47:03.668088 env[1202]: time="2025-05-10T00:47:03.668006026Z" level=info msg="CreateContainer within sandbox \"ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 00:47:03.686112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1457348515.mount: Deactivated successfully. May 10 00:47:03.689780 env[1202]: time="2025-05-10T00:47:03.689717917Z" level=info msg="CreateContainer within sandbox \"ed5205ee3c7c6ed875d85d99965f33c3f4ede330ed397d699198f3ecc8bb1e1f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e53b4b56cd6fe761988ddb9832d2040a92c2ad3ba24593d7e2afca3678681b32\"" May 10 00:47:03.690399 env[1202]: time="2025-05-10T00:47:03.690368048Z" level=info msg="StartContainer for \"e53b4b56cd6fe761988ddb9832d2040a92c2ad3ba24593d7e2afca3678681b32\"" May 10 00:47:03.709145 systemd[1]: Started cri-containerd-e53b4b56cd6fe761988ddb9832d2040a92c2ad3ba24593d7e2afca3678681b32.scope. May 10 00:47:03.724067 kernel: kauditd_printk_skb: 50 callbacks suppressed May 10 00:47:03.724193 kernel: audit: type=1400 audit(1746838023.719:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.729157 kernel: audit: type=1400 audit(1746838023.719:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.729218 kernel: audit: type=1400 audit(1746838023.719:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.736671 kernel: audit: type=1400 audit(1746838023.719:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.736746 kernel: audit: type=1400 audit(1746838023.719:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.743944 kernel: audit: type=1400 audit(1746838023.719:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.744010 kernel: audit: type=1400 audit(1746838023.719:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.751034 kernel: audit: type=1400 audit(1746838023.719:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.751090 kernel: audit: type=1400 audit(1746838023.719:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.758443 kernel: audit: type=1400 audit(1746838023.724:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.724000 audit: BPF prog-id=116 op=LOAD May 10 00:47:03.724000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.724000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2773 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535336234623536636436666537363139383864646239383332643230 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2773 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535336234623536636436666537363139383864646239383332643230 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.725000 audit: BPF prog-id=117 op=LOAD May 10 00:47:03.725000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009eac0 items=0 ppid=2773 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535336234623536636436666537363139383864646239383332643230 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.728000 audit: BPF prog-id=118 op=LOAD May 10 00:47:03.728000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009eb08 items=0 ppid=2773 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535336234623536636436666537363139383864646239383332643230 May 10 00:47:03.731000 audit: BPF prog-id=118 op=UNLOAD May 10 00:47:03.731000 audit: BPF prog-id=117 op=UNLOAD May 10 00:47:03.731000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:03.731000 audit: BPF prog-id=119 op=LOAD May 10 00:47:03.731000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009ef18 items=0 ppid=2773 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535336234623536636436666537363139383864646239383332643230 May 10 00:47:03.769071 env[1202]: time="2025-05-10T00:47:03.767562428Z" level=info msg="StartContainer for \"e53b4b56cd6fe761988ddb9832d2040a92c2ad3ba24593d7e2afca3678681b32\" returns successfully" May 10 00:47:03.814000 audit[2875]: AVC avc: denied { search } for pid=2875 comm="rpcbind" name="crypto" dev="proc" ino=22987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:03.814000 audit[2875]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efe3b99c0c0 a2=0 a3=0 items=0 ppid=2857 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 key=(null) May 10 00:47:03.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 10 00:47:03.884000 audit[2880]: AVC avc: denied { search } for pid=2880 comm="dbus-daemon" name="crypto" dev="proc" ino=22987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:03.884000 audit[2880]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fef92f2b0c0 a2=0 a3=0 items=0 ppid=2857 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 key=(null) May 10 00:47:03.884000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:47:03.888000 audit[2881]: AVC avc: denied { watch } for pid=2881 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c284,c949 tclass=dir permissive=0 May 10 00:47:03.888000 audit[2881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55ecdde80380 a2=2c8 a3=7ffdd2a3945c items=0 ppid=2857 pid=2881 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 key=(null) May 10 00:47:03.888000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:47:03.892000 audit[2882]: AVC avc: denied { read } for pid=2882 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21278 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 10 00:47:03.892000 audit[2882]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f741c9cc320 a1=80000 a2=d a3=7ffdf9b3dca0 items=0 ppid=2857 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 key=(null) May 10 00:47:03.892000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:47:03.893000 audit[2882]: AVC avc: denied { search } for pid=2882 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:03.893000 audit[2882]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f741bf200c0 a2=0 a3=0 items=0 ppid=2857 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c949 key=(null) May 10 00:47:03.893000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:47:04.495000 audit[2900]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:04.495000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcd39290a0 a2=0 a3=7ffcd392908c items=0 ppid=1673 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:04.501000 audit[2900]: NETFILTER_CFG table=nat:91 family=2 entries=106 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:04.501000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcd39290a0 a2=0 a3=7ffcd392908c items=0 ppid=1673 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:04.593534 kubelet[1446]: E0510 00:47:04.593451 1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:04.630319 env[1202]: time="2025-05-10T00:47:04.630268557Z" level=info msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" May 10 00:47:04.634354 kubelet[1446]: E0510 00:47:04.634312 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.668 [WARNING][2917] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-csi--node--driver--xjwvd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b", ResourceVersion:"1148", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b", Pod:"csi-node-driver-xjwvd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid00500f25c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.668 [INFO][2917] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.668 [INFO][2917] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" iface="eth0" netns="" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.668 [INFO][2917] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.668 [INFO][2917] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.687 [INFO][2925] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.688 [INFO][2925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.688 [INFO][2925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.694 [WARNING][2925] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.694 [INFO][2925] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.696 [INFO][2925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:04.698496 env[1202]: 2025-05-10 00:47:04.696 [INFO][2917] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.699400 env[1202]: time="2025-05-10T00:47:04.698532896Z" level=info msg="TearDown network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" successfully" May 10 00:47:04.699400 env[1202]: time="2025-05-10T00:47:04.698575035Z" level=info msg="StopPodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" returns successfully" May 10 00:47:04.699400 env[1202]: time="2025-05-10T00:47:04.699212052Z" level=info msg="RemovePodSandbox for \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" May 10 00:47:04.699400 env[1202]: time="2025-05-10T00:47:04.699240335Z" level=info msg="Forcibly stopping sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\"" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.746 [WARNING][2947] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-csi--node--driver--xjwvd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c7bafc47-1a33-4bd1-8f25-1a48cd1d990b", ResourceVersion:"1148", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"52a2dfbd6b4c9da8a1676fa9d1d0bbe71e539c52bef38a8e5d95240dccee0c2b", Pod:"csi-node-driver-xjwvd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid00500f25c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.746 [INFO][2947] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.746 [INFO][2947] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" iface="eth0" netns="" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.746 [INFO][2947] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.746 [INFO][2947] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.765 [INFO][2955] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.765 [INFO][2955] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.765 [INFO][2955] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.771 [WARNING][2955] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.771 [INFO][2955] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" HandleID="k8s-pod-network.36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" Workload="10.0.0.129-k8s-csi--node--driver--xjwvd-eth0" May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.772 [INFO][2955] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:04.775317 env[1202]: 2025-05-10 00:47:04.773 [INFO][2947] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa" May 10 00:47:04.775317 env[1202]: time="2025-05-10T00:47:04.775187608Z" level=info msg="TearDown network for sandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" successfully" May 10 00:47:04.778614 env[1202]: time="2025-05-10T00:47:04.778552679Z" level=info msg="RemovePodSandbox \"36357100d61bbccb3571a8878e79983a4ce5c7a7d8a25170cc0fd23e944c1aaa\" returns successfully" May 10 00:47:04.779345 env[1202]: time="2025-05-10T00:47:04.779291547Z" level=info msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.814 [WARNING][2978] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5acfc581-85e1-4324-86da-9c769c7c2ace", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e", Pod:"nginx-deployment-8587fbcb89-ctpns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali757862d9277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.814 [INFO][2978] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.814 [INFO][2978] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" iface="eth0" netns="" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.814 [INFO][2978] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.814 [INFO][2978] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.832 [INFO][2986] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.832 [INFO][2986] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.833 [INFO][2986] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.839 [WARNING][2986] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.839 [INFO][2986] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.841 [INFO][2986] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:04.843885 env[1202]: 2025-05-10 00:47:04.842 [INFO][2978] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.844423 env[1202]: time="2025-05-10T00:47:04.843945874Z" level=info msg="TearDown network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" successfully" May 10 00:47:04.844423 env[1202]: time="2025-05-10T00:47:04.843978837Z" level=info msg="StopPodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" returns successfully" May 10 00:47:04.844644 env[1202]: time="2025-05-10T00:47:04.844602738Z" level=info msg="RemovePodSandbox for \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" May 10 00:47:04.844814 env[1202]: time="2025-05-10T00:47:04.844642152Z" level=info msg="Forcibly stopping sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\"" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.879 [WARNING][3009] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5acfc581-85e1-4324-86da-9c769c7c2ace", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"9659cf67903d4d9933b4765514f8729c45d59b9649d800a6c318ee0a51279b6e", Pod:"nginx-deployment-8587fbcb89-ctpns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali757862d9277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.879 [INFO][3009] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.879 [INFO][3009] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" iface="eth0" netns="" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.879 [INFO][3009] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.879 [INFO][3009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.902 [INFO][3017] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.902 [INFO][3017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.902 [INFO][3017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.907 [WARNING][3017] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.907 [INFO][3017] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" HandleID="k8s-pod-network.668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" Workload="10.0.0.129-k8s-nginx--deployment--8587fbcb89--ctpns-eth0" May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.908 [INFO][3017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:04.910474 env[1202]: 2025-05-10 00:47:04.909 [INFO][3009] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff" May 10 00:47:04.910953 env[1202]: time="2025-05-10T00:47:04.910501915Z" level=info msg="TearDown network for sandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" successfully" May 10 00:47:04.913949 env[1202]: time="2025-05-10T00:47:04.913911520Z" level=info msg="RemovePodSandbox \"668a6e20cd380f9ae08c794bd43810aebd7503e72d1104ae8970286d0af391ff\" returns successfully" May 10 00:47:05.634589 kubelet[1446]: E0510 00:47:05.634526 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:06.635309 kubelet[1446]: E0510 00:47:06.635239 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:07.635970 kubelet[1446]: E0510 00:47:07.635885 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:08.637047 kubelet[1446]: E0510 00:47:08.636962 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:09.637922 kubelet[1446]: E0510 00:47:09.637849 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:10.639064 kubelet[1446]: E0510 00:47:10.638959 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:11.640112 kubelet[1446]: E0510 00:47:11.640007 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:12.640255 kubelet[1446]: E0510 00:47:12.640188 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:13.242169 kubelet[1446]: I0510 00:47:13.242084 1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=11.451581875 podStartE2EDuration="18.24205907s" podCreationTimestamp="2025-05-10 00:46:55 +0000 UTC" firstStartedPulling="2025-05-10 00:46:56.875357731 +0000 UTC m=+52.856632108" lastFinishedPulling="2025-05-10 00:47:03.665834926 +0000 UTC m=+59.647109303" observedRunningTime="2025-05-10 00:47:04.484667314 +0000 UTC m=+60.465941701" watchObservedRunningTime="2025-05-10 00:47:13.24205907 +0000 UTC m=+69.223333437" May 10 00:47:13.247839 systemd[1]: Created slice kubepods-besteffort-pod1e2c8aa7_f94b_44b4_9f5e_2e1940a8df3b.slice. May 10 00:47:13.408087 kubelet[1446]: I0510 00:47:13.407997 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-55tq2\" (UniqueName: \"kubernetes.io/projected/1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b-kube-api-access-55tq2\") pod \"test-pod-1\" (UID: \"1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b\") " pod="default/test-pod-1" May 10 00:47:13.408087 kubelet[1446]: I0510 00:47:13.408070 1446 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d75db43c-cdec-4fbf-a622-179e642b94b7\" (UniqueName: \"kubernetes.io/nfs/1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b-pvc-d75db43c-cdec-4fbf-a622-179e642b94b7\") pod \"test-pod-1\" (UID: \"1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b\") " pod="default/test-pod-1" May 10 00:47:13.521000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.524455 kernel: Failed to create system directory netfs May 10 00:47:13.524522 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:47:13.524541 kernel: audit: type=1400 audit(1746838033.521:765): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.524564 kernel: Failed to create system directory netfs May 10 00:47:13.525297 kernel: audit: type=1400 audit(1746838033.521:765): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.521000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.521000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.533632 kernel: Failed to create system directory netfs May 10 00:47:13.533667 kernel: audit: type=1400 audit(1746838033.521:765): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.533690 kernel: Failed to create system directory netfs May 10 00:47:13.537064 kernel: audit: type=1400 audit(1746838033.521:765): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.521000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.521000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f10722b5e0 a1=153bc a2=55f0c96a82b0 a3=5 items=0 ppid=68 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.521000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:13.549076 kernel: audit: type=1300 audit(1746838033.521:765): arch=c000003e syscall=175 success=yes exit=0 a0=55f10722b5e0 a1=153bc a2=55f0c96a82b0 a3=5 items=0 ppid=68 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.549207 kernel: audit: type=1327 audit(1746838033.521:765): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.550456 kernel: Failed to create system directory fscache May 10 00:47:13.550538 kernel: audit: type=1400 audit(1746838033.541:766): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.550566 kernel: Failed to create system directory fscache May 10 00:47:13.550581 kernel: Failed to create system directory fscache May 10 00:47:13.555088 kernel: audit: type=1400 audit(1746838033.541:766): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.555188 kernel: audit: type=1400 audit(1746838033.541:766): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.556701 kernel: Failed to create system directory fscache May 10 00:47:13.556770 kernel: audit: type=1400 audit(1746838033.541:766): avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.563941 kernel: Failed to create system directory fscache May 10 00:47:13.564123 kernel: Failed to create system directory fscache May 10 00:47:13.564155 kernel: Failed to create system directory fscache May 10 00:47:13.564178 kernel: Failed to create system directory fscache May 10 00:47:13.564195 kernel: Failed to create system directory fscache May 10 00:47:13.564212 kernel: Failed to create system directory fscache May 10 00:47:13.564235 kernel: Failed to create system directory fscache May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.574100 kernel: Failed to create system directory fscache May 10 00:47:13.574151 kernel: Failed to create system directory fscache May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.541000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.575690 kernel: Failed to create system directory fscache May 10 00:47:13.541000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f1074409c0 a1=4c0fc a2=55f0c96a82b0 a3=5 items=0 ppid=68 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.541000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:13.578043 kernel: FS-Cache: Loaded May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.610051 kernel: Failed to create system directory sunrpc May 10 00:47:13.610100 kernel: Failed to create system directory sunrpc May 10 00:47:13.610119 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.611727 kernel: Failed to create system directory sunrpc May 10 00:47:13.611929 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.612500 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.613234 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.614689 kernel: Failed to create system directory sunrpc May 10 00:47:13.614724 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.615434 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.616192 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.617716 kernel: Failed to create system directory sunrpc May 10 00:47:13.617758 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.618509 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.620048 kernel: Failed to create system directory sunrpc May 10 00:47:13.620087 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.621536 kernel: Failed to create system directory sunrpc May 10 00:47:13.621572 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.623053 kernel: Failed to create system directory sunrpc May 10 00:47:13.623106 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.624553 kernel: Failed to create system directory sunrpc May 10 00:47:13.624589 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.631619 kernel: Failed to create system directory sunrpc May 10 00:47:13.631741 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.633157 kernel: Failed to create system directory sunrpc May 10 00:47:13.633190 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.634684 kernel: Failed to create system directory sunrpc May 10 00:47:13.634705 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.636250 kernel: Failed to create system directory sunrpc May 10 00:47:13.636307 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.638604 kernel: Failed to create system directory sunrpc May 10 00:47:13.638639 kernel: Failed to create system directory sunrpc May 10 00:47:13.638669 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.640252 kernel: Failed to create system directory sunrpc May 10 00:47:13.640315 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.640387 kubelet[1446]: E0510 00:47:13.640323 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.642658 kernel: Failed to create system directory sunrpc May 10 00:47:13.642693 kernel: Failed to create system directory sunrpc May 10 00:47:13.642726 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.644253 kernel: Failed to create system directory sunrpc May 10 00:47:13.644308 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.659867 kernel: Failed to create system directory sunrpc May 10 00:47:13.660091 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.661428 kernel: Failed to create system directory sunrpc May 10 00:47:13.661458 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.663748 kernel: Failed to create system directory sunrpc May 10 00:47:13.663782 kernel: Failed to create system directory sunrpc May 10 00:47:13.663811 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.664500 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.666117 kernel: Failed to create system directory sunrpc May 10 00:47:13.666146 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.667718 kernel: Failed to create system directory sunrpc May 10 00:47:13.667761 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.669327 kernel: Failed to create system directory sunrpc May 10 00:47:13.669376 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.671565 kernel: Failed to create system directory sunrpc May 10 00:47:13.671623 kernel: Failed to create system directory sunrpc May 10 00:47:13.671652 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.673076 kernel: Failed to create system directory sunrpc May 10 00:47:13.673123 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.674599 kernel: Failed to create system directory sunrpc May 10 00:47:13.674632 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.676187 kernel: Failed to create system directory sunrpc May 10 00:47:13.676251 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.677793 kernel: Failed to create system directory sunrpc May 10 00:47:13.677843 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.679411 kernel: Failed to create system directory sunrpc May 10 00:47:13.679448 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.681712 kernel: Failed to create system directory sunrpc May 10 00:47:13.681760 kernel: Failed to create system directory sunrpc May 10 00:47:13.681782 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.683324 kernel: Failed to create system directory sunrpc May 10 00:47:13.683383 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.706190 kernel: Failed to create system directory sunrpc May 10 00:47:13.706352 kernel: Failed to create system directory sunrpc May 10 00:47:13.706377 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.708625 kernel: Failed to create system directory sunrpc May 10 00:47:13.708701 kernel: Failed to create system directory sunrpc May 10 00:47:13.708722 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.710373 kernel: Failed to create system directory sunrpc May 10 00:47:13.710405 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.712760 kernel: Failed to create system directory sunrpc May 10 00:47:13.712822 kernel: Failed to create system directory sunrpc May 10 00:47:13.712842 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.714296 kernel: Failed to create system directory sunrpc May 10 00:47:13.714319 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.716557 kernel: Failed to create system directory sunrpc May 10 00:47:13.716605 kernel: Failed to create system directory sunrpc May 10 00:47:13.716621 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.717351 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.719577 kernel: Failed to create system directory sunrpc May 10 00:47:13.719612 kernel: Failed to create system directory sunrpc May 10 00:47:13.719627 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.721120 kernel: Failed to create system directory sunrpc May 10 00:47:13.721145 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.722614 kernel: Failed to create system directory sunrpc May 10 00:47:13.722648 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.724120 kernel: Failed to create system directory sunrpc May 10 00:47:13.724152 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.725593 kernel: Failed to create system directory sunrpc May 10 00:47:13.725628 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.727151 kernel: Failed to create system directory sunrpc May 10 00:47:13.727186 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.728616 kernel: Failed to create system directory sunrpc May 10 00:47:13.728650 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.730163 kernel: Failed to create system directory sunrpc May 10 00:47:13.730185 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.731651 kernel: Failed to create system directory sunrpc May 10 00:47:13.731696 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.732409 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.734775 kernel: Failed to create system directory sunrpc May 10 00:47:13.734827 kernel: Failed to create system directory sunrpc May 10 00:47:13.734859 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.735530 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.736360 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.737718 kernel: Failed to create system directory sunrpc May 10 00:47:13.737773 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.739301 kernel: Failed to create system directory sunrpc May 10 00:47:13.739333 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.741562 kernel: Failed to create system directory sunrpc May 10 00:47:13.741597 kernel: Failed to create system directory sunrpc May 10 00:47:13.741625 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.743061 kernel: Failed to create system directory sunrpc May 10 00:47:13.743099 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.744594 kernel: Failed to create system directory sunrpc May 10 00:47:13.744633 kernel: Failed to create system directory sunrpc May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.597000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.746134 kernel: Failed to create system directory sunrpc May 10 00:47:13.756687 kernel: RPC: Registered named UNIX socket transport module. May 10 00:47:13.756738 kernel: RPC: Registered udp transport module. May 10 00:47:13.756765 kernel: RPC: Registered tcp transport module. May 10 00:47:13.757401 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 00:47:13.597000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f10748cad0 a1=1a814c a2=55f0c96a82b0 a3=5 items=6 ppid=68 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.597000 audit: CWD cwd="/" May 10 00:47:13.597000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PATH item=1 name=(null) inode=24914 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PATH item=2 name=(null) inode=24914 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PATH item=3 name=(null) inode=24915 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PATH item=4 name=(null) inode=24914 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PATH item=5 name=(null) inode=24916 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:13.597000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.802245 kernel: Failed to create system directory nfs May 10 00:47:13.802296 kernel: Failed to create system directory nfs May 10 00:47:13.802312 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.804786 kernel: Failed to create system directory nfs May 10 00:47:13.804827 kernel: Failed to create system directory nfs May 10 00:47:13.804849 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.806478 kernel: Failed to create system directory nfs May 10 00:47:13.806509 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.808143 kernel: Failed to create system directory nfs May 10 00:47:13.808168 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.809815 kernel: Failed to create system directory nfs May 10 00:47:13.809845 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.811493 kernel: Failed to create system directory nfs May 10 00:47:13.811522 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.813171 kernel: Failed to create system directory nfs May 10 00:47:13.813207 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.815721 kernel: Failed to create system directory nfs May 10 00:47:13.815755 kernel: Failed to create system directory nfs May 10 00:47:13.815791 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.817411 kernel: Failed to create system directory nfs May 10 00:47:13.817442 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.819111 kernel: Failed to create system directory nfs May 10 00:47:13.819143 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.820784 kernel: Failed to create system directory nfs May 10 00:47:13.820808 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.822472 kernel: Failed to create system directory nfs May 10 00:47:13.822495 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.824144 kernel: Failed to create system directory nfs May 10 00:47:13.824167 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.825829 kernel: Failed to create system directory nfs May 10 00:47:13.825865 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.827494 kernel: Failed to create system directory nfs May 10 00:47:13.827517 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.829177 kernel: Failed to create system directory nfs May 10 00:47:13.829213 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.830845 kernel: Failed to create system directory nfs May 10 00:47:13.830871 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.881110 kernel: Failed to create system directory nfs May 10 00:47:13.881229 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.882862 kernel: Failed to create system directory nfs May 10 00:47:13.882901 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.884577 kernel: Failed to create system directory nfs May 10 00:47:13.884621 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.886283 kernel: Failed to create system directory nfs May 10 00:47:13.886324 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.888830 kernel: Failed to create system directory nfs May 10 00:47:13.889018 kernel: Failed to create system directory nfs May 10 00:47:13.889057 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.890494 kernel: Failed to create system directory nfs May 10 00:47:13.890529 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.892177 kernel: Failed to create system directory nfs May 10 00:47:13.892220 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.934857 kernel: Failed to create system directory nfs May 10 00:47:13.935033 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.936701 kernel: Failed to create system directory nfs May 10 00:47:13.936872 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.937520 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.939188 kernel: Failed to create system directory nfs May 10 00:47:13.939233 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.788000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.940823 kernel: Failed to create system directory nfs May 10 00:47:13.788000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f1076ada10 a1=16eae4 a2=55f0c96a82b0 a3=5 items=0 ppid=68 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.788000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:13.969055 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.008654 kernel: Failed to create system directory nfs4 May 10 00:47:14.008731 kernel: Failed to create system directory nfs4 May 10 00:47:14.008767 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.010369 kernel: Failed to create system directory nfs4 May 10 00:47:14.010433 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.076211 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.078208 kernel: Failed to create system directory nfs4 May 10 00:47:14.078324 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.080383 kernel: Failed to create system directory nfs4 May 10 00:47:14.080430 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.082112 kernel: Failed to create system directory nfs4 May 10 00:47:14.082154 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.083735 kernel: Failed to create system directory nfs4 May 10 00:47:14.083772 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.085445 kernel: Failed to create system directory nfs4 May 10 00:47:14.085504 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.087159 kernel: Failed to create system directory nfs4 May 10 00:47:14.087201 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.089704 kernel: Failed to create system directory nfs4 May 10 00:47:14.089739 kernel: Failed to create system directory nfs4 May 10 00:47:14.089772 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.091295 kernel: Failed to create system directory nfs4 May 10 00:47:14.091337 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.093785 kernel: Failed to create system directory nfs4 May 10 00:47:14.093862 kernel: Failed to create system directory nfs4 May 10 00:47:14.093889 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.138719 kernel: Failed to create system directory nfs4 May 10 00:47:14.138766 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.140613 kernel: Failed to create system directory nfs4 May 10 00:47:14.140656 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.142479 kernel: Failed to create system directory nfs4 May 10 00:47:14.142526 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.144366 kernel: Failed to create system directory nfs4 May 10 00:47:14.144404 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.146234 kernel: Failed to create system directory nfs4 May 10 00:47:14.146284 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.148130 kernel: Failed to create system directory nfs4 May 10 00:47:14.148166 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.150056 kernel: Failed to create system directory nfs4 May 10 00:47:14.150102 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.151929 kernel: Failed to create system directory nfs4 May 10 00:47:14.151984 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.153926 kernel: Failed to create system directory nfs4 May 10 00:47:14.154131 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.155764 kernel: Failed to create system directory nfs4 May 10 00:47:14.155912 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.157649 kernel: Failed to create system directory nfs4 May 10 00:47:14.157692 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.159620 kernel: Failed to create system directory nfs4 May 10 00:47:14.159708 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.161632 kernel: Failed to create system directory nfs4 May 10 00:47:14.161716 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.163595 kernel: Failed to create system directory nfs4 May 10 00:47:14.163659 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.165488 kernel: Failed to create system directory nfs4 May 10 00:47:14.165533 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.167423 kernel: Failed to create system directory nfs4 May 10 00:47:14.167489 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.169316 kernel: Failed to create system directory nfs4 May 10 00:47:14.169357 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.171271 kernel: Failed to create system directory nfs4 May 10 00:47:14.171445 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.173088 kernel: Failed to create system directory nfs4 May 10 00:47:14.173128 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.174811 kernel: Failed to create system directory nfs4 May 10 00:47:14.174854 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.176602 kernel: Failed to create system directory nfs4 May 10 00:47:14.176658 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.178331 kernel: Failed to create system directory nfs4 May 10 00:47:14.178361 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.180154 kernel: Failed to create system directory nfs4 May 10 00:47:14.180204 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.181871 kernel: Failed to create system directory nfs4 May 10 00:47:14.181915 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.183602 kernel: Failed to create system directory nfs4 May 10 00:47:14.183661 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.185321 kernel: Failed to create system directory nfs4 May 10 00:47:14.185366 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.187086 kernel: Failed to create system directory nfs4 May 10 00:47:14.187133 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.188800 kernel: Failed to create system directory nfs4 May 10 00:47:14.188834 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.190543 kernel: Failed to create system directory nfs4 May 10 00:47:14.190587 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.192271 kernel: Failed to create system directory nfs4 May 10 00:47:14.192314 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.214729 kernel: Failed to create system directory nfs4 May 10 00:47:14.214775 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.216538 kernel: Failed to create system directory nfs4 May 10 00:47:14.216582 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.218305 kernel: Failed to create system directory nfs4 May 10 00:47:14.218344 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.220105 kernel: Failed to create system directory nfs4 May 10 00:47:14.220132 kernel: Failed to create system directory nfs4 May 10 00:47:13.996000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.381109 kernel: NFS: Registering the id_resolver key type May 10 00:47:14.381305 kernel: Key type id_resolver registered May 10 00:47:14.381348 kernel: Key type id_legacy registered May 10 00:47:13.996000 audit[3040]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fdf16373010 a1=209404 a2=5619243052b0 a3=5 items=0 ppid=68 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:13.996000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.414480 kernel: Failed to create system directory rpcgss May 10 00:47:14.414547 kernel: Failed to create system directory rpcgss May 10 00:47:14.414571 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.416775 kernel: Failed to create system directory rpcgss May 10 00:47:14.416930 kernel: Failed to create system directory rpcgss May 10 00:47:14.416947 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.418328 kernel: Failed to create system directory rpcgss May 10 00:47:14.418376 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.420602 kernel: Failed to create system directory rpcgss May 10 00:47:14.420629 kernel: Failed to create system directory rpcgss May 10 00:47:14.420643 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.440560 kernel: Failed to create system directory rpcgss May 10 00:47:14.440599 kernel: Failed to create system directory rpcgss May 10 00:47:14.440616 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.442051 kernel: Failed to create system directory rpcgss May 10 00:47:14.442084 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.443691 kernel: Failed to create system directory rpcgss May 10 00:47:14.443736 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.444493 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.445264 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.446885 kernel: Failed to create system directory rpcgss May 10 00:47:14.446948 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.448425 kernel: Failed to create system directory rpcgss May 10 00:47:14.448461 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.390000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:14.450711 kernel: Failed to create system directory rpcgss May 10 00:47:14.450789 kernel: Failed to create system directory rpcgss May 10 00:47:14.390000 audit[3041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1d5fdaf010 a1=70b64 a2=55f3a07962b0 a3=5 items=0 ppid=68 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.390000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 00:47:14.474928 nfsidmap[3051]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 10 00:47:14.477928 nfsidmap[3054]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 10 00:47:14.485000 audit[1273]: AVC avc: denied { watch_reads } for pid=1273 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1273]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56364ef0a660 a2=10 a3=629211afd576fa78 items=0 ppid=1 pid=1273 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.485000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:14.485000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1273]: AVC avc: denied { watch_reads } for pid=1273 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1273]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56364ef0a660 a2=10 a3=629211afd576fa78 items=0 ppid=1 pid=1273 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.485000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:14.485000 audit[1273]: AVC avc: denied { watch_reads } for pid=1273 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:14.485000 audit[1273]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56364ef0a660 a2=10 a3=629211afd576fa78 items=0 ppid=1 pid=1273 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.485000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:14.641322 kubelet[1446]: E0510 00:47:14.641132 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:14.751733 env[1202]: time="2025-05-10T00:47:14.751658323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b,Namespace:default,Attempt:0,}" May 10 00:47:15.180347 systemd-networkd[1024]: cali5ec59c6bf6e: Link UP May 10 00:47:15.183087 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:15.183190 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 00:47:15.183474 systemd-networkd[1024]: cali5ec59c6bf6e: Gained carrier May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.085 [INFO][3058] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.129-k8s-test--pod--1-eth0 default 1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b 1290 0 2025-05-10 00:46:56 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.129 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.085 [INFO][3058] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.115 [INFO][3073] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" HandleID="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Workload="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.130 [INFO][3073] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" HandleID="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Workload="10.0.0.129-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004311f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.129", "pod":"test-pod-1", "timestamp":"2025-05-10 00:47:15.11551549 +0000 UTC"}, Hostname:"10.0.0.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.131 [INFO][3073] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.131 [INFO][3073] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.131 [INFO][3073] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.129' May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.134 [INFO][3073] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.140 [INFO][3073] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.147 [INFO][3073] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.150 [INFO][3073] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.154 [INFO][3073] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.154 [INFO][3073] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.158 [INFO][3073] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.168 [INFO][3073] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.175 [INFO][3073] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.196/26] block=192.168.20.192/26 handle="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.175 [INFO][3073] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.196/26] handle="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" host="10.0.0.129" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.175 [INFO][3073] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.175 [INFO][3073] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.196/26] IPv6=[] ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" HandleID="k8s-pod-network.743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Workload="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.196884 env[1202]: 2025-05-10 00:47:15.177 [INFO][3058] cni-plugin/k8s.go 386: Populated endpoint ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:15.197985 env[1202]: 2025-05-10 00:47:15.177 [INFO][3058] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.196/32] ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.197985 env[1202]: 2025-05-10 00:47:15.177 [INFO][3058] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.197985 env[1202]: 2025-05-10 00:47:15.183 [INFO][3058] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.197985 env[1202]: 2025-05-10 00:47:15.183 [INFO][3058] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.129", ContainerID:"743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"86:c0:66:71:a7:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:15.197985 env[1202]: 2025-05-10 00:47:15.193 [INFO][3058] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.129-k8s-test--pod--1-eth0" May 10 00:47:15.209000 audit[3097]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:15.209000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff8a0fbd40 a2=0 a3=7fff8a0fbd2c items=0 ppid=2186 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:15.211397 env[1202]: time="2025-05-10T00:47:15.211217204Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:15.211397 env[1202]: time="2025-05-10T00:47:15.211277928Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:15.211397 env[1202]: time="2025-05-10T00:47:15.211290091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:15.211548 env[1202]: time="2025-05-10T00:47:15.211488814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e pid=3100 runtime=io.containerd.runc.v2 May 10 00:47:15.232869 systemd[1]: Started cri-containerd-743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e.scope. May 10 00:47:15.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.249000 audit: BPF prog-id=120 op=LOAD May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3100 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336131373639356532633931343533383038326465616635646330 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3100 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336131373639356532633931343533383038326465616635646330 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit: BPF prog-id=121 op=LOAD May 10 00:47:15.250000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024640 items=0 ppid=3100 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336131373639356532633931343533383038326465616635646330 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit: BPF prog-id=122 op=LOAD May 10 00:47:15.250000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024688 items=0 ppid=3100 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336131373639356532633931343533383038326465616635646330 May 10 00:47:15.250000 audit: BPF prog-id=122 op=UNLOAD May 10 00:47:15.250000 audit: BPF prog-id=121 op=UNLOAD May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.250000 audit: BPF prog-id=123 op=LOAD May 10 00:47:15.250000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024a98 items=0 ppid=3100 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336131373639356532633931343533383038326465616635646330 May 10 00:47:15.253242 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:15.279817 env[1202]: time="2025-05-10T00:47:15.279733637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1e2c8aa7-f94b-44b4-9f5e-2e1940a8df3b,Namespace:default,Attempt:0,} returns sandbox id \"743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e\"" May 10 00:47:15.282844 env[1202]: time="2025-05-10T00:47:15.282783652Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:47:15.641465 kubelet[1446]: E0510 00:47:15.641332 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:15.757984 env[1202]: time="2025-05-10T00:47:15.757899562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:15.761171 env[1202]: time="2025-05-10T00:47:15.760988069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:15.764069 env[1202]: time="2025-05-10T00:47:15.763997568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:15.767851 env[1202]: time="2025-05-10T00:47:15.767786901Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:47:15.768925 env[1202]: time="2025-05-10T00:47:15.768880594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:15.770966 env[1202]: time="2025-05-10T00:47:15.770919892Z" level=info msg="CreateContainer within sandbox \"743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 00:47:15.795157 env[1202]: time="2025-05-10T00:47:15.795061148Z" level=info msg="CreateContainer within sandbox \"743a17695e2c914538082deaf5dc0b677898714ef574dddb4862988cb9640d2e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"66113258cbd1a710a92c59e032579cd625152176dc1c5985b383a29b51283f81\"" May 10 00:47:15.796047 env[1202]: time="2025-05-10T00:47:15.795855599Z" level=info msg="StartContainer for \"66113258cbd1a710a92c59e032579cd625152176dc1c5985b383a29b51283f81\"" May 10 00:47:15.812511 systemd[1]: Started cri-containerd-66113258cbd1a710a92c59e032579cd625152176dc1c5985b383a29b51283f81.scope. May 10 00:47:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit: BPF prog-id=124 op=LOAD May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3100 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313133323538636264316137313061393263353965303332353739 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3100 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313133323538636264316137313061393263353965303332353739 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.825000 audit: BPF prog-id=125 op=LOAD May 10 00:47:15.825000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a0690 items=0 ppid=3100 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313133323538636264316137313061393263353965303332353739 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit: BPF prog-id=126 op=LOAD May 10 00:47:15.826000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a06d8 items=0 ppid=3100 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313133323538636264316137313061393263353965303332353739 May 10 00:47:15.826000 audit: BPF prog-id=126 op=UNLOAD May 10 00:47:15.826000 audit: BPF prog-id=125 op=UNLOAD May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:15.826000 audit: BPF prog-id=127 op=LOAD May 10 00:47:15.826000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a0ae8 items=0 ppid=3100 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313133323538636264316137313061393263353965303332353739 May 10 00:47:15.899292 env[1202]: time="2025-05-10T00:47:15.899112504Z" level=info msg="StartContainer for \"66113258cbd1a710a92c59e032579cd625152176dc1c5985b383a29b51283f81\" returns successfully" May 10 00:47:16.642271 kubelet[1446]: E0510 00:47:16.642112 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:16.874278 systemd-networkd[1024]: cali5ec59c6bf6e: Gained IPv6LL May 10 00:47:17.642320 kubelet[1446]: E0510 00:47:17.642261 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:18.643248 kubelet[1446]: E0510 00:47:18.643172 1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"