May 10 00:36:18.948716 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:36:18.948746 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:36:18.948760 kernel: BIOS-provided physical RAM map: May 10 00:36:18.948769 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:36:18.948776 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:36:18.948784 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:36:18.948794 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:36:18.948802 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:36:18.948810 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:36:18.948820 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:36:18.948828 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 10 00:36:18.948836 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:36:18.948844 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:36:18.948852 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:36:18.948862 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:36:18.948873 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:36:18.948881 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:36:18.948889 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:36:18.948902 kernel: NX (Execute Disable) protection: active May 10 00:36:18.948911 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:36:18.948920 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:36:18.948928 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:36:18.948936 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:36:18.948944 kernel: extended physical RAM map: May 10 00:36:18.948953 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:36:18.948964 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:36:18.948972 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:36:18.948981 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:36:18.949003 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:36:18.949061 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:36:18.949071 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:36:18.949080 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 10 00:36:18.949088 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 10 00:36:18.949096 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 10 00:36:18.949105 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 10 00:36:18.949113 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 10 00:36:18.949124 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:36:18.949133 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:36:18.949141 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:36:18.949150 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:36:18.949163 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:36:18.949172 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:36:18.949181 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:36:18.949192 kernel: efi: EFI v2.70 by EDK II May 10 00:36:18.949201 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 10 00:36:18.949210 kernel: random: crng init done May 10 00:36:18.949220 kernel: SMBIOS 2.8 present. May 10 00:36:18.949229 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 10 00:36:18.949238 kernel: Hypervisor detected: KVM May 10 00:36:18.949247 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:36:18.949256 kernel: kvm-clock: cpu 0, msr 4a196001, primary cpu clock May 10 00:36:18.949265 kernel: kvm-clock: using sched offset of 5224479039 cycles May 10 00:36:18.949281 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:36:18.949291 kernel: tsc: Detected 2794.748 MHz processor May 10 00:36:18.949300 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:36:18.949309 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:36:18.949319 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 10 00:36:18.949328 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:36:18.949337 kernel: Using GB pages for direct mapping May 10 00:36:18.949346 kernel: Secure boot disabled May 10 00:36:18.949356 kernel: ACPI: Early table checksum verification disabled May 10 00:36:18.949367 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 10 00:36:18.949376 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 10 00:36:18.949385 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949395 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949428 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 10 00:36:18.949452 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949468 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949481 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949490 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:36:18.949516 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 10 00:36:18.950667 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 10 00:36:18.950689 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 10 00:36:18.950698 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 10 00:36:18.950707 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 10 00:36:18.950715 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 10 00:36:18.950721 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 10 00:36:18.950729 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 10 00:36:18.950746 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 10 00:36:18.950760 kernel: No NUMA configuration found May 10 00:36:18.950776 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 10 00:36:18.950802 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 10 00:36:18.950826 kernel: Zone ranges: May 10 00:36:18.950837 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:36:18.950847 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 10 00:36:18.950856 kernel: Normal empty May 10 00:36:18.950866 kernel: Movable zone start for each node May 10 00:36:18.950875 kernel: Early memory node ranges May 10 00:36:18.950886 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:36:18.950894 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 10 00:36:18.950903 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 10 00:36:18.950912 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 10 00:36:18.950921 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 10 00:36:18.950929 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 10 00:36:18.950938 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 10 00:36:18.950946 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:36:18.950955 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:36:18.950963 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 10 00:36:18.950973 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:36:18.950984 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 10 00:36:18.951016 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:36:18.951023 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 10 00:36:18.951029 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:36:18.951036 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:36:18.951043 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:36:18.951049 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:36:18.951056 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:36:18.951065 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:36:18.951071 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:36:18.951078 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:36:18.951088 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:36:18.951097 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:36:18.951104 kernel: TSC deadline timer available May 10 00:36:18.951111 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:36:18.951117 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:36:18.951124 kernel: kvm-guest: setup PV sched yield May 10 00:36:18.951132 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:36:18.951139 kernel: Booting paravirtualized kernel on KVM May 10 00:36:18.951150 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:36:18.951158 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:36:18.951165 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:36:18.951172 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:36:18.951179 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:36:18.951186 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:36:18.951193 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 10 00:36:18.951200 kernel: kvm-guest: PV spinlocks enabled May 10 00:36:18.951207 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:36:18.951214 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 10 00:36:18.951222 kernel: Policy zone: DMA32 May 10 00:36:18.951231 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:36:18.951238 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:36:18.951245 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:36:18.951254 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:36:18.951261 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:36:18.951268 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 10 00:36:18.951275 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:36:18.951282 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:36:18.951289 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:36:18.951296 kernel: rcu: Hierarchical RCU implementation. May 10 00:36:18.951304 kernel: rcu: RCU event tracing is enabled. May 10 00:36:18.951311 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:36:18.951319 kernel: Rude variant of Tasks RCU enabled. May 10 00:36:18.951326 kernel: Tracing variant of Tasks RCU enabled. May 10 00:36:18.951333 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:36:18.951340 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:36:18.951347 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:36:18.951354 kernel: Console: colour dummy device 80x25 May 10 00:36:18.951360 kernel: printk: console [ttyS0] enabled May 10 00:36:18.951367 kernel: ACPI: Core revision 20210730 May 10 00:36:18.951374 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:36:18.951383 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:36:18.951390 kernel: x2apic enabled May 10 00:36:18.951399 kernel: Switched APIC routing to physical x2apic. May 10 00:36:18.951409 kernel: kvm-guest: setup PV IPIs May 10 00:36:18.951418 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:36:18.951427 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:36:18.951436 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:36:18.951445 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:36:18.951457 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:36:18.951466 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:36:18.951473 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:36:18.951481 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:36:18.951488 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:36:18.951495 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:36:18.951504 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:36:18.951514 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:36:18.951526 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:36:18.951536 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:36:18.951545 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:36:18.951552 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:36:18.951559 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:36:18.951566 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:36:18.951573 kernel: Freeing SMP alternatives memory: 32K May 10 00:36:18.951580 kernel: pid_max: default: 32768 minimum: 301 May 10 00:36:18.951587 kernel: LSM: Security Framework initializing May 10 00:36:18.951593 kernel: SELinux: Initializing. May 10 00:36:18.951608 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:36:18.951616 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:36:18.951624 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:36:18.951631 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:36:18.951638 kernel: ... version: 0 May 10 00:36:18.951645 kernel: ... bit width: 48 May 10 00:36:18.955244 kernel: ... generic registers: 6 May 10 00:36:18.955277 kernel: ... value mask: 0000ffffffffffff May 10 00:36:18.955306 kernel: ... max period: 00007fffffffffff May 10 00:36:18.955335 kernel: ... fixed-purpose events: 0 May 10 00:36:18.955365 kernel: ... event mask: 000000000000003f May 10 00:36:18.955385 kernel: signal: max sigframe size: 1776 May 10 00:36:18.955411 kernel: rcu: Hierarchical SRCU implementation. May 10 00:36:18.955431 kernel: smp: Bringing up secondary CPUs ... May 10 00:36:18.955439 kernel: x86: Booting SMP configuration: May 10 00:36:18.955447 kernel: .... node #0, CPUs: #1 May 10 00:36:18.955456 kernel: kvm-clock: cpu 1, msr 4a196041, secondary cpu clock May 10 00:36:18.955465 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:36:18.955474 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 10 00:36:18.955487 kernel: #2 May 10 00:36:18.955496 kernel: kvm-clock: cpu 2, msr 4a196081, secondary cpu clock May 10 00:36:18.955503 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:36:18.955511 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 10 00:36:18.955520 kernel: #3 May 10 00:36:18.955530 kernel: kvm-clock: cpu 3, msr 4a1960c1, secondary cpu clock May 10 00:36:18.955537 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:36:18.955546 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 10 00:36:18.955555 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:36:18.955572 kernel: smpboot: Max logical packages: 1 May 10 00:36:18.955581 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:36:18.955588 kernel: devtmpfs: initialized May 10 00:36:18.955597 kernel: x86/mm: Memory block size: 128MB May 10 00:36:18.955616 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 10 00:36:18.955625 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 10 00:36:18.955635 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 10 00:36:18.955643 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 10 00:36:18.955651 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 10 00:36:18.955661 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:36:18.955668 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:36:18.955675 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:36:18.955682 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:36:18.955689 kernel: audit: initializing netlink subsys (disabled) May 10 00:36:18.955697 kernel: audit: type=2000 audit(1746837378.575:1): state=initialized audit_enabled=0 res=1 May 10 00:36:18.955704 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:36:18.955711 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:36:18.955718 kernel: cpuidle: using governor menu May 10 00:36:18.955726 kernel: ACPI: bus type PCI registered May 10 00:36:18.955732 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:36:18.955739 kernel: dca service started, version 1.12.1 May 10 00:36:18.955746 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:36:18.955753 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:36:18.955760 kernel: PCI: Using configuration type 1 for base access May 10 00:36:18.955767 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:36:18.955774 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:36:18.955781 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:36:18.955790 kernel: ACPI: Added _OSI(Module Device) May 10 00:36:18.955797 kernel: ACPI: Added _OSI(Processor Device) May 10 00:36:18.955804 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:36:18.955811 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:36:18.955818 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:36:18.955824 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:36:18.955831 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:36:18.955838 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:36:18.955845 kernel: ACPI: Interpreter enabled May 10 00:36:18.955853 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:36:18.955860 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:36:18.955867 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:36:18.955874 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:36:18.955881 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:36:18.956128 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:36:18.956258 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:36:18.956487 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:36:18.956511 kernel: PCI host bridge to bus 0000:00 May 10 00:36:18.956677 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:36:18.959521 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:36:18.960154 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:36:18.960344 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:36:18.960498 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:36:18.960680 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 10 00:36:18.960813 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:36:18.961212 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:36:18.962730 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:36:18.962925 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 10 00:36:18.963276 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 10 00:36:18.963373 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:36:18.963485 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 10 00:36:18.963587 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:36:18.963710 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:36:18.963798 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 10 00:36:18.963957 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 10 00:36:18.964165 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 10 00:36:18.964550 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:36:18.964748 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 10 00:36:18.964977 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 10 00:36:18.965153 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 10 00:36:18.965523 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:36:18.965651 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 10 00:36:18.965786 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 10 00:36:18.965951 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 10 00:36:18.968694 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 10 00:36:18.968801 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:36:18.968879 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:36:18.968980 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:36:18.969109 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 10 00:36:18.969228 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 10 00:36:18.969374 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:36:18.969487 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 10 00:36:18.969504 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:36:18.969515 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:36:18.969525 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:36:18.969535 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:36:18.969545 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:36:18.969567 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:36:18.969577 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:36:18.969609 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:36:18.969620 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:36:18.969652 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:36:18.969673 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:36:18.969684 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:36:18.969705 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:36:18.969734 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:36:18.969756 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:36:18.969766 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:36:18.969780 kernel: iommu: Default domain type: Translated May 10 00:36:18.969790 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:36:18.970036 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:36:18.970215 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:36:18.970325 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:36:18.970339 kernel: vgaarb: loaded May 10 00:36:18.970347 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:36:18.970354 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:36:18.970366 kernel: PTP clock support registered May 10 00:36:18.970374 kernel: Registered efivars operations May 10 00:36:18.970381 kernel: PCI: Using ACPI for IRQ routing May 10 00:36:18.970388 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:36:18.970396 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 10 00:36:18.970403 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 10 00:36:18.970410 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 10 00:36:18.970417 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 10 00:36:18.970426 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 10 00:36:18.970439 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 10 00:36:18.970448 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:36:18.970457 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:36:18.970465 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:36:18.970472 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:36:18.970480 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:36:18.970487 kernel: pnp: PnP ACPI init May 10 00:36:18.970820 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:36:18.970867 kernel: pnp: PnP ACPI: found 6 devices May 10 00:36:18.970915 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:36:18.970961 kernel: NET: Registered PF_INET protocol family May 10 00:36:18.970975 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:36:18.970985 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:36:18.971787 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:36:18.971807 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:36:18.971827 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:36:18.971845 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:36:18.972350 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:36:18.972358 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:36:18.972366 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:36:18.972376 kernel: NET: Registered PF_XDP protocol family May 10 00:36:18.972593 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 10 00:36:18.972785 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 10 00:36:18.972937 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:36:18.973146 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:36:18.974436 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:36:18.974517 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:36:18.974771 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:36:18.974843 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 10 00:36:18.974861 kernel: PCI: CLS 0 bytes, default 64 May 10 00:36:18.974869 kernel: Initialise system trusted keyrings May 10 00:36:18.974877 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:36:18.974884 kernel: Key type asymmetric registered May 10 00:36:18.974893 kernel: Asymmetric key parser 'x509' registered May 10 00:36:18.974906 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:36:18.974915 kernel: io scheduler mq-deadline registered May 10 00:36:18.974932 kernel: io scheduler kyber registered May 10 00:36:18.974941 kernel: io scheduler bfq registered May 10 00:36:18.974949 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:36:18.974957 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:36:18.974964 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:36:18.974972 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:36:18.974979 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:36:18.974988 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:36:18.975007 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:36:18.975015 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:36:18.975025 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:36:18.975203 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:36:18.975233 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:36:18.975335 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:36:18.977515 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:36:18 UTC (1746837378) May 10 00:36:18.977622 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:36:18.977638 kernel: efifb: probing for efifb May 10 00:36:18.977647 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 10 00:36:18.977657 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 10 00:36:18.977664 kernel: efifb: scrolling: redraw May 10 00:36:18.977672 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:36:18.977680 kernel: Console: switching to colour frame buffer device 160x50 May 10 00:36:18.977687 kernel: fb0: EFI VGA frame buffer device May 10 00:36:18.977698 kernel: pstore: Registered efi as persistent store backend May 10 00:36:18.977705 kernel: NET: Registered PF_INET6 protocol family May 10 00:36:18.977713 kernel: Segment Routing with IPv6 May 10 00:36:18.977721 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:36:18.977729 kernel: NET: Registered PF_PACKET protocol family May 10 00:36:18.977737 kernel: Key type dns_resolver registered May 10 00:36:18.977745 kernel: IPI shorthand broadcast: enabled May 10 00:36:18.977758 kernel: sched_clock: Marking stable (502304881, 136910638)->(678603887, -39388368) May 10 00:36:18.977778 kernel: registered taskstats version 1 May 10 00:36:18.977793 kernel: Loading compiled-in X.509 certificates May 10 00:36:18.977812 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:36:18.977821 kernel: Key type .fscrypt registered May 10 00:36:18.977829 kernel: Key type fscrypt-provisioning registered May 10 00:36:18.977843 kernel: pstore: Using crash dump compression: deflate May 10 00:36:18.977864 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:36:18.977889 kernel: ima: Allocated hash algorithm: sha1 May 10 00:36:18.977908 kernel: ima: No architecture policies found May 10 00:36:18.977928 kernel: clk: Disabling unused clocks May 10 00:36:18.977948 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:36:18.977966 kernel: Write protecting the kernel read-only data: 28672k May 10 00:36:18.977983 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:36:18.978017 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:36:18.978031 kernel: Run /init as init process May 10 00:36:18.978050 kernel: with arguments: May 10 00:36:18.978065 kernel: /init May 10 00:36:18.978082 kernel: with environment: May 10 00:36:18.978101 kernel: HOME=/ May 10 00:36:18.978118 kernel: TERM=linux May 10 00:36:18.978135 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:36:18.978157 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:36:18.978170 systemd[1]: Detected virtualization kvm. May 10 00:36:18.978178 systemd[1]: Detected architecture x86-64. May 10 00:36:18.978188 systemd[1]: Running in initrd. May 10 00:36:18.978196 systemd[1]: No hostname configured, using default hostname. May 10 00:36:18.978204 systemd[1]: Hostname set to . May 10 00:36:18.978212 systemd[1]: Initializing machine ID from VM UUID. May 10 00:36:18.978220 systemd[1]: Queued start job for default target initrd.target. May 10 00:36:18.978228 systemd[1]: Started systemd-ask-password-console.path. May 10 00:36:18.978235 systemd[1]: Reached target cryptsetup.target. May 10 00:36:18.978243 systemd[1]: Reached target paths.target. May 10 00:36:18.978261 systemd[1]: Reached target slices.target. May 10 00:36:18.978278 systemd[1]: Reached target swap.target. May 10 00:36:18.978301 systemd[1]: Reached target timers.target. May 10 00:36:18.978321 systemd[1]: Listening on iscsid.socket. May 10 00:36:18.978340 systemd[1]: Listening on iscsiuio.socket. May 10 00:36:18.978360 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:36:18.978378 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:36:18.978398 systemd[1]: Listening on systemd-journald.socket. May 10 00:36:18.981474 systemd[1]: Listening on systemd-networkd.socket. May 10 00:36:18.981490 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:36:18.981499 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:36:18.981507 systemd[1]: Reached target sockets.target. May 10 00:36:18.981515 systemd[1]: Starting kmod-static-nodes.service... May 10 00:36:18.981523 systemd[1]: Finished network-cleanup.service. May 10 00:36:18.981531 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:36:18.981562 systemd[1]: Starting systemd-journald.service... May 10 00:36:18.981591 systemd[1]: Starting systemd-modules-load.service... May 10 00:36:18.981617 systemd[1]: Starting systemd-resolved.service... May 10 00:36:18.981632 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:36:18.981643 systemd[1]: Finished kmod-static-nodes.service. May 10 00:36:18.981658 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:36:18.981672 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:36:18.981683 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:36:18.981694 kernel: audit: type=1130 audit(1746837378.951:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.981711 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:36:18.981727 kernel: audit: type=1130 audit(1746837378.958:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.981737 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:36:18.981759 systemd-journald[198]: Journal started May 10 00:36:18.981852 systemd-journald[198]: Runtime Journal (/run/log/journal/59286849affe4adba68e6b9ae8b3f63e) is 6.0M, max 48.4M, 42.4M free. May 10 00:36:18.990048 systemd[1]: Started systemd-journald.service. May 10 00:36:18.990119 kernel: audit: type=1130 audit(1746837378.986:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:18.935734 systemd-modules-load[199]: Inserted module 'overlay' May 10 00:36:19.031746 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:36:19.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.034527 systemd[1]: Starting dracut-cmdline.service... May 10 00:36:19.039660 kernel: audit: type=1130 audit(1746837379.033:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.044139 systemd-resolved[200]: Positive Trust Anchors: May 10 00:36:19.046672 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:36:19.046691 dracut-cmdline[216]: dracut-dracut-053 May 10 00:36:19.044170 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:36:19.044212 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:36:19.060840 kernel: audit: type=1130 audit(1746837379.049:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.060885 kernel: Bridge firewalling registered May 10 00:36:19.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.047327 systemd-resolved[200]: Defaulting to hostname 'linux'. May 10 00:36:19.048499 systemd[1]: Started systemd-resolved.service. May 10 00:36:19.063122 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:36:19.050153 systemd[1]: Reached target nss-lookup.target. May 10 00:36:19.059790 systemd-modules-load[199]: Inserted module 'br_netfilter' May 10 00:36:19.083020 kernel: SCSI subsystem initialized May 10 00:36:19.098145 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:36:19.098176 kernel: device-mapper: uevent: version 1.0.3 May 10 00:36:19.099858 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:36:19.103742 systemd-modules-load[199]: Inserted module 'dm_multipath' May 10 00:36:19.104832 systemd[1]: Finished systemd-modules-load.service. May 10 00:36:19.110224 kernel: audit: type=1130 audit(1746837379.105:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.106094 systemd[1]: Starting systemd-sysctl.service... May 10 00:36:19.118472 systemd[1]: Finished systemd-sysctl.service. May 10 00:36:19.123510 kernel: audit: type=1130 audit(1746837379.118:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.148047 kernel: Loading iSCSI transport class v2.0-870. May 10 00:36:19.164048 kernel: iscsi: registered transport (tcp) May 10 00:36:19.187029 kernel: iscsi: registered transport (qla4xxx) May 10 00:36:19.187116 kernel: QLogic iSCSI HBA Driver May 10 00:36:19.228858 systemd[1]: Finished dracut-cmdline.service. May 10 00:36:19.234410 kernel: audit: type=1130 audit(1746837379.228:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.234467 systemd[1]: Starting dracut-pre-udev.service... May 10 00:36:19.287028 kernel: raid6: avx2x4 gen() 29708 MB/s May 10 00:36:19.304026 kernel: raid6: avx2x4 xor() 6179 MB/s May 10 00:36:19.321039 kernel: raid6: avx2x2 gen() 28104 MB/s May 10 00:36:19.338019 kernel: raid6: avx2x2 xor() 19128 MB/s May 10 00:36:19.355025 kernel: raid6: avx2x1 gen() 21443 MB/s May 10 00:36:19.374024 kernel: raid6: avx2x1 xor() 15032 MB/s May 10 00:36:19.391014 kernel: raid6: sse2x4 gen() 14746 MB/s May 10 00:36:19.408036 kernel: raid6: sse2x4 xor() 5830 MB/s May 10 00:36:19.429327 kernel: raid6: sse2x2 gen() 8381 MB/s May 10 00:36:19.444031 kernel: raid6: sse2x2 xor() 7281 MB/s May 10 00:36:19.461023 kernel: raid6: sse2x1 gen() 10366 MB/s May 10 00:36:19.478488 kernel: raid6: sse2x1 xor() 7565 MB/s May 10 00:36:19.478520 kernel: raid6: using algorithm avx2x4 gen() 29708 MB/s May 10 00:36:19.478530 kernel: raid6: .... xor() 6179 MB/s, rmw enabled May 10 00:36:19.480211 kernel: raid6: using avx2x2 recovery algorithm May 10 00:36:19.494026 kernel: xor: automatically using best checksumming function avx May 10 00:36:19.588027 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:36:19.598160 systemd[1]: Finished dracut-pre-udev.service. May 10 00:36:19.602747 kernel: audit: type=1130 audit(1746837379.597:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.602000 audit: BPF prog-id=7 op=LOAD May 10 00:36:19.602000 audit: BPF prog-id=8 op=LOAD May 10 00:36:19.603302 systemd[1]: Starting systemd-udevd.service... May 10 00:36:19.616559 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 10 00:36:19.621399 systemd[1]: Started systemd-udevd.service. May 10 00:36:19.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.623820 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:36:19.634786 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 10 00:36:19.659928 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:36:19.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.661070 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:36:19.708026 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:36:19.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:19.737016 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:36:19.752440 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:36:19.752460 kernel: GPT:9289727 != 19775487 May 10 00:36:19.752470 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:36:19.752479 kernel: GPT:9289727 != 19775487 May 10 00:36:19.752487 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:36:19.752496 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:36:19.752505 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:36:19.752514 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:36:19.754074 kernel: libata version 3.00 loaded. May 10 00:36:19.754100 kernel: AES CTR mode by8 optimization enabled May 10 00:36:19.768010 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:36:19.797608 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:36:19.797623 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:36:19.797718 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:36:19.797798 kernel: scsi host0: ahci May 10 00:36:19.797931 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (478) May 10 00:36:19.797947 kernel: scsi host1: ahci May 10 00:36:19.798164 kernel: scsi host2: ahci May 10 00:36:19.798351 kernel: scsi host3: ahci May 10 00:36:19.798444 kernel: scsi host4: ahci May 10 00:36:19.798540 kernel: scsi host5: ahci May 10 00:36:19.798670 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 10 00:36:19.798684 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 10 00:36:19.798695 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 10 00:36:19.798704 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 10 00:36:19.798712 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 10 00:36:19.798721 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 10 00:36:19.781185 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:36:19.792276 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:36:19.801096 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:36:19.808607 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:36:19.813659 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:36:19.816156 systemd[1]: Starting disk-uuid.service... May 10 00:36:19.822959 disk-uuid[538]: Primary Header is updated. May 10 00:36:19.822959 disk-uuid[538]: Secondary Entries is updated. May 10 00:36:19.822959 disk-uuid[538]: Secondary Header is updated. May 10 00:36:19.826655 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:36:19.829022 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:36:20.105624 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:36:20.105697 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:36:20.105708 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:36:20.107016 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:36:20.108025 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:36:20.109551 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:36:20.109565 kernel: ata3.00: applying bridge limits May 10 00:36:20.111015 kernel: ata3.00: configured for UDMA/100 May 10 00:36:20.115014 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:36:20.115039 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:36:20.145016 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:36:20.162641 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:36:20.162654 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:36:20.831021 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:36:20.831375 disk-uuid[539]: The operation has completed successfully. May 10 00:36:20.858984 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:36:20.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:20.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:20.859088 systemd[1]: Finished disk-uuid.service. May 10 00:36:20.860333 systemd[1]: Starting verity-setup.service... May 10 00:36:20.874020 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:36:20.892451 systemd[1]: Found device dev-mapper-usr.device. May 10 00:36:20.895924 systemd[1]: Mounting sysusr-usr.mount... May 10 00:36:20.898037 systemd[1]: Finished verity-setup.service. May 10 00:36:20.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:20.957021 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:36:20.957672 systemd[1]: Mounted sysusr-usr.mount. May 10 00:36:20.959491 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:36:20.961966 systemd[1]: Starting ignition-setup.service... May 10 00:36:20.964448 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:36:21.004448 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:36:21.004509 kernel: BTRFS info (device vda6): using free space tree May 10 00:36:21.004519 kernel: BTRFS info (device vda6): has skinny extents May 10 00:36:21.014831 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:36:21.024641 systemd[1]: Finished ignition-setup.service. May 10 00:36:21.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.027171 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:36:21.053593 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:36:21.055969 systemd[1]: Starting systemd-networkd.service... May 10 00:36:21.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.054000 audit: BPF prog-id=9 op=LOAD May 10 00:36:21.089287 systemd-networkd[716]: lo: Link UP May 10 00:36:21.089300 systemd-networkd[716]: lo: Gained carrier May 10 00:36:21.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.089755 systemd-networkd[716]: Enumeration completed May 10 00:36:21.089902 systemd[1]: Started systemd-networkd.service. May 10 00:36:21.090053 systemd-networkd[716]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:36:21.091585 systemd-networkd[716]: eth0: Link UP May 10 00:36:21.091589 systemd-networkd[716]: eth0: Gained carrier May 10 00:36:21.091828 systemd[1]: Reached target network.target. May 10 00:36:21.094189 systemd[1]: Starting iscsiuio.service... May 10 00:36:21.117417 systemd[1]: Started iscsiuio.service. May 10 00:36:21.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.120136 systemd[1]: Starting iscsid.service... May 10 00:36:21.123149 systemd-networkd[716]: eth0: DHCPv4 address 10.0.0.27/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:36:21.127223 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:36:21.127223 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:36:21.127223 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:36:21.127223 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:36:21.127223 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:36:21.127223 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:36:21.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.130409 systemd[1]: Started iscsid.service. May 10 00:36:21.136107 systemd[1]: Starting dracut-initqueue.service... May 10 00:36:21.153660 systemd[1]: Finished dracut-initqueue.service. May 10 00:36:21.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.154880 systemd[1]: Reached target remote-fs-pre.target. May 10 00:36:21.156563 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:36:21.157603 systemd[1]: Reached target remote-fs.target. May 10 00:36:21.159150 systemd[1]: Starting dracut-pre-mount.service... May 10 00:36:21.167211 systemd[1]: Finished dracut-pre-mount.service. May 10 00:36:21.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.255279 ignition[673]: Ignition 2.14.0 May 10 00:36:21.255290 ignition[673]: Stage: fetch-offline May 10 00:36:21.255384 ignition[673]: no configs at "/usr/lib/ignition/base.d" May 10 00:36:21.255403 ignition[673]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:21.255567 ignition[673]: parsed url from cmdline: "" May 10 00:36:21.255571 ignition[673]: no config URL provided May 10 00:36:21.255576 ignition[673]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:36:21.255584 ignition[673]: no config at "/usr/lib/ignition/user.ign" May 10 00:36:21.255603 ignition[673]: op(1): [started] loading QEMU firmware config module May 10 00:36:21.255620 ignition[673]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:36:21.260703 ignition[673]: op(1): [finished] loading QEMU firmware config module May 10 00:36:21.262738 ignition[673]: parsing config with SHA512: 6fb4aa9bfa3091890396d734aa4fcabd2718b09e9483e880b3321dc50a908ee46680da13dcd5cc03e837539ca0215f6275502f85a094226b92ec892e5cb2941c May 10 00:36:21.269390 unknown[673]: fetched base config from "system" May 10 00:36:21.269409 unknown[673]: fetched user config from "qemu" May 10 00:36:21.271484 ignition[673]: fetch-offline: fetch-offline passed May 10 00:36:21.272426 ignition[673]: Ignition finished successfully May 10 00:36:21.273892 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:36:21.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.275766 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:36:21.278335 systemd[1]: Starting ignition-kargs.service... May 10 00:36:21.294375 ignition[738]: Ignition 2.14.0 May 10 00:36:21.294383 ignition[738]: Stage: kargs May 10 00:36:21.294501 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 10 00:36:21.294511 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:21.295601 ignition[738]: kargs: kargs passed May 10 00:36:21.295660 ignition[738]: Ignition finished successfully May 10 00:36:21.304874 systemd[1]: Finished ignition-kargs.service. May 10 00:36:21.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.307692 systemd[1]: Starting ignition-disks.service... May 10 00:36:21.343086 ignition[744]: Ignition 2.14.0 May 10 00:36:21.343097 ignition[744]: Stage: disks May 10 00:36:21.343214 ignition[744]: no configs at "/usr/lib/ignition/base.d" May 10 00:36:21.343223 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:21.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.345227 systemd[1]: Finished ignition-disks.service. May 10 00:36:21.344224 ignition[744]: disks: disks passed May 10 00:36:21.346600 systemd[1]: Reached target initrd-root-device.target. May 10 00:36:21.344272 ignition[744]: Ignition finished successfully May 10 00:36:21.348593 systemd[1]: Reached target local-fs-pre.target. May 10 00:36:21.349515 systemd[1]: Reached target local-fs.target. May 10 00:36:21.350358 systemd[1]: Reached target sysinit.target. May 10 00:36:21.351124 systemd[1]: Reached target basic.target. May 10 00:36:21.353550 systemd[1]: Starting systemd-fsck-root.service... May 10 00:36:21.369280 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:36:21.413138 systemd[1]: Finished systemd-fsck-root.service. May 10 00:36:21.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.415208 systemd[1]: Mounting sysroot.mount... May 10 00:36:21.424023 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:36:21.424179 systemd[1]: Mounted sysroot.mount. May 10 00:36:21.424733 systemd[1]: Reached target initrd-root-fs.target. May 10 00:36:21.426759 systemd[1]: Mounting sysroot-usr.mount... May 10 00:36:21.428863 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:36:21.428906 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:36:21.428932 systemd[1]: Reached target ignition-diskful.target. May 10 00:36:21.431292 systemd[1]: Mounted sysroot-usr.mount. May 10 00:36:21.433408 systemd[1]: Starting initrd-setup-root.service... May 10 00:36:21.439406 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:36:21.443615 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory May 10 00:36:21.450524 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:36:21.457329 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:36:21.488421 systemd[1]: Finished initrd-setup-root.service. May 10 00:36:21.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.490085 systemd[1]: Starting ignition-mount.service... May 10 00:36:21.491253 systemd[1]: Starting sysroot-boot.service... May 10 00:36:21.496210 bash[803]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:36:21.506154 ignition[805]: INFO : Ignition 2.14.0 May 10 00:36:21.507934 ignition[805]: INFO : Stage: mount May 10 00:36:21.507934 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:36:21.507934 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:21.510487 ignition[805]: INFO : mount: mount passed May 10 00:36:21.510487 ignition[805]: INFO : Ignition finished successfully May 10 00:36:21.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.510177 systemd[1]: Finished ignition-mount.service. May 10 00:36:21.516970 systemd[1]: Finished sysroot-boot.service. May 10 00:36:21.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:21.905487 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:36:21.914053 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (813) May 10 00:36:21.914119 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:36:21.916024 kernel: BTRFS info (device vda6): using free space tree May 10 00:36:21.916044 kernel: BTRFS info (device vda6): has skinny extents May 10 00:36:21.920126 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:36:21.921295 systemd[1]: Starting ignition-files.service... May 10 00:36:21.937324 ignition[833]: INFO : Ignition 2.14.0 May 10 00:36:21.937324 ignition[833]: INFO : Stage: files May 10 00:36:21.937324 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:36:21.937324 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:21.941921 ignition[833]: DEBUG : files: compiled without relabeling support, skipping May 10 00:36:21.943375 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:36:21.943375 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:36:21.946585 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:36:21.948053 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:36:21.949461 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:36:21.949461 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 10 00:36:21.949461 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:36:21.949461 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:36:21.948690 unknown[833]: wrote ssh authorized keys file for user: core May 10 00:36:21.957856 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:36:21.957856 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:36:21.957856 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:36:21.957856 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:36:21.957856 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 10 00:36:22.258248 systemd-networkd[716]: eth0: Gained IPv6LL May 10 00:36:22.366219 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 10 00:36:22.807176 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:36:22.807176 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 10 00:36:22.813682 ignition[833]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:36:22.813682 ignition[833]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:36:22.813682 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 10 00:36:22.813682 ignition[833]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:36:22.813682 ignition[833]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:36:22.833957 ignition[833]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:36:22.836672 ignition[833]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:36:22.836672 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:36:22.836672 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:36:22.836672 ignition[833]: INFO : files: files passed May 10 00:36:22.836672 ignition[833]: INFO : Ignition finished successfully May 10 00:36:22.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.835684 systemd[1]: Finished ignition-files.service. May 10 00:36:22.838127 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:36:22.839152 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:36:22.853785 initrd-setup-root-after-ignition[857]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:36:22.840375 systemd[1]: Starting ignition-quench.service... May 10 00:36:22.856172 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:36:22.844163 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:36:22.844254 systemd[1]: Finished ignition-quench.service. May 10 00:36:22.846604 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:36:22.848269 systemd[1]: Reached target ignition-complete.target. May 10 00:36:22.850956 systemd[1]: Starting initrd-parse-etc.service... May 10 00:36:22.865958 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:36:22.866215 systemd[1]: Finished initrd-parse-etc.service. May 10 00:36:22.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.868205 systemd[1]: Reached target initrd-fs.target. May 10 00:36:22.869686 systemd[1]: Reached target initrd.target. May 10 00:36:22.870557 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:36:22.871571 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:36:22.881573 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:36:22.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.883275 systemd[1]: Starting initrd-cleanup.service... May 10 00:36:22.893283 systemd[1]: Stopped target nss-lookup.target. May 10 00:36:22.894310 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:36:22.895982 systemd[1]: Stopped target timers.target. May 10 00:36:22.897631 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:36:22.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.897752 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:36:22.899320 systemd[1]: Stopped target initrd.target. May 10 00:36:22.900974 systemd[1]: Stopped target basic.target. May 10 00:36:22.902570 systemd[1]: Stopped target ignition-complete.target. May 10 00:36:22.904223 systemd[1]: Stopped target ignition-diskful.target. May 10 00:36:22.905874 systemd[1]: Stopped target initrd-root-device.target. May 10 00:36:22.906908 systemd[1]: Stopped target remote-fs.target. May 10 00:36:22.908619 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:36:22.910315 systemd[1]: Stopped target sysinit.target. May 10 00:36:22.911954 systemd[1]: Stopped target local-fs.target. May 10 00:36:22.913573 systemd[1]: Stopped target local-fs-pre.target. May 10 00:36:22.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.915248 systemd[1]: Stopped target swap.target. May 10 00:36:22.916711 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:36:22.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.916861 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:36:22.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.918439 systemd[1]: Stopped target cryptsetup.target. May 10 00:36:22.920005 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:36:22.920121 systemd[1]: Stopped dracut-initqueue.service. May 10 00:36:22.921658 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:36:22.921778 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:36:22.923534 systemd[1]: Stopped target paths.target. May 10 00:36:22.925033 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:36:22.930034 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:36:22.931347 systemd[1]: Stopped target slices.target. May 10 00:36:22.933335 systemd[1]: Stopped target sockets.target. May 10 00:36:22.935036 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:36:22.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.935126 systemd[1]: Closed iscsid.socket. May 10 00:36:22.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.936503 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:36:22.936636 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:36:22.938265 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:36:22.938375 systemd[1]: Stopped ignition-files.service. May 10 00:36:22.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.940893 systemd[1]: Stopping ignition-mount.service... May 10 00:36:22.951084 ignition[873]: INFO : Ignition 2.14.0 May 10 00:36:22.951084 ignition[873]: INFO : Stage: umount May 10 00:36:22.951084 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:36:22.951084 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:36:22.951084 ignition[873]: INFO : umount: umount passed May 10 00:36:22.951084 ignition[873]: INFO : Ignition finished successfully May 10 00:36:22.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.942668 systemd[1]: Stopping iscsiuio.service... May 10 00:36:22.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.944291 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:36:22.944459 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:36:22.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.947408 systemd[1]: Stopping sysroot-boot.service... May 10 00:36:22.948236 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:36:22.948402 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:36:22.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.951489 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:36:22.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.951655 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:36:22.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.954907 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:36:22.955005 systemd[1]: Stopped iscsiuio.service. May 10 00:36:22.955879 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:36:22.955945 systemd[1]: Stopped ignition-mount.service. May 10 00:36:22.959959 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:36:22.960047 systemd[1]: Finished initrd-cleanup.service. May 10 00:36:22.961084 systemd[1]: Stopped target network.target. May 10 00:36:22.962707 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:36:22.962740 systemd[1]: Closed iscsiuio.socket. May 10 00:36:22.963035 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:36:22.963070 systemd[1]: Stopped ignition-disks.service. May 10 00:36:22.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.966255 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:36:22.966356 systemd[1]: Stopped ignition-kargs.service. May 10 00:36:22.966736 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:36:22.966777 systemd[1]: Stopped ignition-setup.service. May 10 00:36:22.969196 systemd[1]: Stopping systemd-networkd.service... May 10 00:36:22.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.970620 systemd[1]: Stopping systemd-resolved.service... May 10 00:36:22.977060 systemd-networkd[716]: eth0: DHCPv6 lease lost May 10 00:36:22.987000 audit: BPF prog-id=9 op=UNLOAD May 10 00:36:22.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.978632 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:36:22.978742 systemd[1]: Stopped systemd-networkd.service. May 10 00:36:22.982877 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:36:22.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.983168 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:36:22.983194 systemd[1]: Closed systemd-networkd.socket. May 10 00:36:22.984276 systemd[1]: Stopping network-cleanup.service... May 10 00:36:22.985336 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:36:22.985376 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:36:22.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:22.986788 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:36:22.986825 systemd[1]: Stopped systemd-sysctl.service. May 10 00:36:22.990678 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:36:22.990799 systemd[1]: Stopped systemd-modules-load.service. May 10 00:36:22.995866 systemd[1]: Stopping systemd-udevd.service... May 10 00:36:22.997851 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:36:22.998389 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:36:22.998513 systemd[1]: Stopped systemd-resolved.service. May 10 00:36:23.009420 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:36:23.010442 systemd[1]: Stopped systemd-udevd.service. May 10 00:36:23.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.012000 audit: BPF prog-id=6 op=UNLOAD May 10 00:36:23.013243 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:36:23.013289 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:36:23.015971 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:36:23.017043 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:36:23.018684 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:36:23.019598 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:36:23.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.021158 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:36:23.021193 systemd[1]: Stopped dracut-cmdline.service. May 10 00:36:23.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.023731 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:36:23.023811 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:36:23.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.027583 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:36:23.029310 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:36:23.029356 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:36:23.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.032336 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:36:23.033327 systemd[1]: Stopped network-cleanup.service. May 10 00:36:23.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.035017 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:36:23.036075 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:36:23.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.054575 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:36:23.055556 systemd[1]: Stopped sysroot-boot.service. May 10 00:36:23.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.057123 systemd[1]: Reached target initrd-switch-root.target. May 10 00:36:23.058819 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:36:23.058858 systemd[1]: Stopped initrd-setup-root.service. May 10 00:36:23.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:23.062095 systemd[1]: Starting initrd-switch-root.service... May 10 00:36:23.078749 systemd[1]: Switching root. May 10 00:36:23.097098 iscsid[722]: iscsid shutting down. May 10 00:36:23.097875 systemd-journald[198]: Journal stopped May 10 00:36:26.632388 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 10 00:36:26.632439 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:36:26.632452 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:36:26.632462 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:36:26.632474 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:36:26.632484 kernel: SELinux: policy capability open_perms=1 May 10 00:36:26.632493 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:36:26.632505 kernel: SELinux: policy capability always_check_network=0 May 10 00:36:26.632514 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:36:26.632524 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:36:26.632536 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:36:26.632545 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:36:26.632554 kernel: kauditd_printk_skb: 63 callbacks suppressed May 10 00:36:26.632565 kernel: audit: type=1403 audit(1746837383.266:74): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:36:26.632575 systemd[1]: Successfully loaded SELinux policy in 150.580ms. May 10 00:36:26.632589 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.680ms. May 10 00:36:26.632602 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:36:26.632613 systemd[1]: Detected virtualization kvm. May 10 00:36:26.632624 systemd[1]: Detected architecture x86-64. May 10 00:36:26.632634 systemd[1]: Detected first boot. May 10 00:36:26.632644 systemd[1]: Initializing machine ID from VM UUID. May 10 00:36:26.632657 kernel: audit: type=1400 audit(1746837383.392:75): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:36:26.632667 kernel: audit: type=1400 audit(1746837383.392:76): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:36:26.632678 kernel: audit: type=1334 audit(1746837383.398:77): prog-id=10 op=LOAD May 10 00:36:26.632687 kernel: audit: type=1334 audit(1746837383.398:78): prog-id=10 op=UNLOAD May 10 00:36:26.632696 kernel: audit: type=1334 audit(1746837383.400:79): prog-id=11 op=LOAD May 10 00:36:26.632706 kernel: audit: type=1334 audit(1746837383.400:80): prog-id=11 op=UNLOAD May 10 00:36:26.632715 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:36:26.632726 kernel: audit: type=1400 audit(1746837383.434:81): avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:36:26.632739 kernel: audit: type=1300 audit(1746837383.434:81): arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:26.632751 kernel: audit: type=1327 audit(1746837383.434:81): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:36:26.632760 systemd[1]: Populated /etc with preset unit settings. May 10 00:36:26.632771 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:36:26.632781 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:36:26.632793 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:36:26.632803 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:36:26.632812 systemd[1]: Stopped iscsid.service. May 10 00:36:26.632824 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:36:26.632834 systemd[1]: Stopped initrd-switch-root.service. May 10 00:36:26.632846 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:36:26.632856 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:36:26.632866 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:36:26.632876 systemd[1]: Created slice system-getty.slice. May 10 00:36:26.632886 systemd[1]: Created slice system-modprobe.slice. May 10 00:36:26.632898 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:36:26.632908 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:36:26.632918 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:36:26.632930 systemd[1]: Created slice user.slice. May 10 00:36:26.632940 systemd[1]: Started systemd-ask-password-console.path. May 10 00:36:26.632951 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:36:26.632961 systemd[1]: Set up automount boot.automount. May 10 00:36:26.632971 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:36:26.632981 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:36:26.633003 systemd[1]: Stopped target initrd-fs.target. May 10 00:36:26.633014 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:36:26.633026 systemd[1]: Reached target integritysetup.target. May 10 00:36:26.633036 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:36:26.633046 systemd[1]: Reached target remote-fs.target. May 10 00:36:26.633056 systemd[1]: Reached target slices.target. May 10 00:36:26.633068 systemd[1]: Reached target swap.target. May 10 00:36:26.633080 systemd[1]: Reached target torcx.target. May 10 00:36:26.633090 systemd[1]: Reached target veritysetup.target. May 10 00:36:26.633100 systemd[1]: Listening on systemd-coredump.socket. May 10 00:36:26.633109 systemd[1]: Listening on systemd-initctl.socket. May 10 00:36:26.633119 systemd[1]: Listening on systemd-networkd.socket. May 10 00:36:26.633129 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:36:26.633139 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:36:26.633149 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:36:26.633161 systemd[1]: Mounting dev-hugepages.mount... May 10 00:36:26.633177 systemd[1]: Mounting dev-mqueue.mount... May 10 00:36:26.633187 systemd[1]: Mounting media.mount... May 10 00:36:26.633197 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:26.633207 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:36:26.633217 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:36:26.633227 systemd[1]: Mounting tmp.mount... May 10 00:36:26.633237 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:36:26.633247 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:36:26.633259 systemd[1]: Starting kmod-static-nodes.service... May 10 00:36:26.633269 systemd[1]: Starting modprobe@configfs.service... May 10 00:36:26.633279 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:36:26.633289 systemd[1]: Starting modprobe@drm.service... May 10 00:36:26.633300 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:36:26.633310 systemd[1]: Starting modprobe@fuse.service... May 10 00:36:26.633320 systemd[1]: Starting modprobe@loop.service... May 10 00:36:26.633331 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:36:26.633343 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:36:26.633356 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:36:26.633367 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:36:26.633377 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:36:26.633387 systemd[1]: Stopped systemd-journald.service. May 10 00:36:26.633397 kernel: fuse: init (API version 7.34) May 10 00:36:26.633406 kernel: loop: module loaded May 10 00:36:26.633415 systemd[1]: Starting systemd-journald.service... May 10 00:36:26.633434 systemd[1]: Starting systemd-modules-load.service... May 10 00:36:26.633444 systemd[1]: Starting systemd-network-generator.service... May 10 00:36:26.633454 systemd[1]: Starting systemd-remount-fs.service... May 10 00:36:26.633466 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:36:26.633476 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:36:26.633486 systemd[1]: Stopped verity-setup.service. May 10 00:36:26.633496 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:26.633506 systemd[1]: Mounted dev-hugepages.mount. May 10 00:36:26.633519 systemd-journald[984]: Journal started May 10 00:36:26.633561 systemd-journald[984]: Runtime Journal (/run/log/journal/59286849affe4adba68e6b9ae8b3f63e) is 6.0M, max 48.4M, 42.4M free. May 10 00:36:23.266000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:36:23.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:36:23.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:36:23.398000 audit: BPF prog-id=10 op=LOAD May 10 00:36:23.398000 audit: BPF prog-id=10 op=UNLOAD May 10 00:36:23.400000 audit: BPF prog-id=11 op=LOAD May 10 00:36:23.400000 audit: BPF prog-id=11 op=UNLOAD May 10 00:36:23.434000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:36:23.434000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:23.434000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:36:23.435000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:36:23.435000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:23.435000 audit: CWD cwd="/" May 10 00:36:23.435000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:23.435000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:23.435000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:36:26.495000 audit: BPF prog-id=12 op=LOAD May 10 00:36:26.495000 audit: BPF prog-id=3 op=UNLOAD May 10 00:36:26.495000 audit: BPF prog-id=13 op=LOAD May 10 00:36:26.495000 audit: BPF prog-id=14 op=LOAD May 10 00:36:26.495000 audit: BPF prog-id=4 op=UNLOAD May 10 00:36:26.495000 audit: BPF prog-id=5 op=UNLOAD May 10 00:36:26.495000 audit: BPF prog-id=15 op=LOAD May 10 00:36:26.495000 audit: BPF prog-id=12 op=UNLOAD May 10 00:36:26.495000 audit: BPF prog-id=16 op=LOAD May 10 00:36:26.496000 audit: BPF prog-id=17 op=LOAD May 10 00:36:26.496000 audit: BPF prog-id=13 op=UNLOAD May 10 00:36:26.496000 audit: BPF prog-id=14 op=UNLOAD May 10 00:36:26.497000 audit: BPF prog-id=18 op=LOAD May 10 00:36:26.497000 audit: BPF prog-id=15 op=UNLOAD May 10 00:36:26.497000 audit: BPF prog-id=19 op=LOAD May 10 00:36:26.497000 audit: BPF prog-id=20 op=LOAD May 10 00:36:26.497000 audit: BPF prog-id=16 op=UNLOAD May 10 00:36:26.497000 audit: BPF prog-id=17 op=UNLOAD May 10 00:36:26.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.506000 audit: BPF prog-id=18 op=UNLOAD May 10 00:36:26.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.608000 audit: BPF prog-id=21 op=LOAD May 10 00:36:26.609000 audit: BPF prog-id=22 op=LOAD May 10 00:36:26.609000 audit: BPF prog-id=23 op=LOAD May 10 00:36:26.609000 audit: BPF prog-id=19 op=UNLOAD May 10 00:36:26.609000 audit: BPF prog-id=20 op=UNLOAD May 10 00:36:26.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.631000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:36:26.631000 audit[984]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdda4e5c10 a2=4000 a3=7ffdda4e5cac items=0 ppid=1 pid=984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:26.631000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:36:23.432604 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:36:26.494331 systemd[1]: Queued start job for default target multi-user.target. May 10 00:36:23.432856 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:36:26.494345 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:36:23.432883 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:36:26.499026 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:36:23.432920 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:36:23.432932 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:36:23.432965 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:36:23.432980 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:36:23.433250 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:36:23.433299 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:36:23.433316 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:36:23.434098 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:36:23.434142 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:36:23.434164 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:36:23.434182 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:36:23.434204 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:36:23.434222 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:36:26.162612 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:36:26.163300 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:36:26.163460 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:36:26.163647 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:36:26.163704 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:36:26.163763 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-10T00:36:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:36:26.637050 systemd[1]: Started systemd-journald.service. May 10 00:36:26.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.637916 systemd[1]: Mounted dev-mqueue.mount. May 10 00:36:26.638846 systemd[1]: Mounted media.mount. May 10 00:36:26.639722 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:36:26.640733 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:36:26.641734 systemd[1]: Mounted tmp.mount. May 10 00:36:26.642765 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:36:26.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.643925 systemd[1]: Finished kmod-static-nodes.service. May 10 00:36:26.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.644928 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:36:26.645060 systemd[1]: Finished modprobe@configfs.service. May 10 00:36:26.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.646104 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:36:26.646222 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:36:26.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.647252 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:36:26.647371 systemd[1]: Finished modprobe@drm.service. May 10 00:36:26.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.648327 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:36:26.648450 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:36:26.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.649498 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:36:26.649614 systemd[1]: Finished modprobe@fuse.service. May 10 00:36:26.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.650637 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:36:26.650756 systemd[1]: Finished modprobe@loop.service. May 10 00:36:26.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.651798 systemd[1]: Finished systemd-modules-load.service. May 10 00:36:26.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.652907 systemd[1]: Finished systemd-network-generator.service. May 10 00:36:26.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.654088 systemd[1]: Finished systemd-remount-fs.service. May 10 00:36:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.655361 systemd[1]: Reached target network-pre.target. May 10 00:36:26.657321 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:36:26.659070 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:36:26.659905 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:36:26.661843 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:36:26.664178 systemd[1]: Starting systemd-journal-flush.service... May 10 00:36:26.665308 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:36:26.666620 systemd[1]: Starting systemd-random-seed.service... May 10 00:36:26.669221 systemd-journald[984]: Time spent on flushing to /var/log/journal/59286849affe4adba68e6b9ae8b3f63e is 14.286ms for 1146 entries. May 10 00:36:26.669221 systemd-journald[984]: System Journal (/var/log/journal/59286849affe4adba68e6b9ae8b3f63e) is 8.0M, max 195.6M, 187.6M free. May 10 00:36:26.709232 systemd-journald[984]: Received client request to flush runtime journal. May 10 00:36:26.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.667804 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:36:26.670720 systemd[1]: Starting systemd-sysctl.service... May 10 00:36:26.672475 systemd[1]: Starting systemd-sysusers.service... May 10 00:36:26.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.675639 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:36:26.676690 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:36:26.682727 systemd[1]: Finished systemd-sysctl.service. May 10 00:36:26.684786 systemd[1]: Finished systemd-random-seed.service. May 10 00:36:26.685850 systemd[1]: Reached target first-boot-complete.target. May 10 00:36:26.695453 systemd[1]: Finished systemd-sysusers.service. May 10 00:36:26.709459 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:36:26.710702 systemd[1]: Finished systemd-journal-flush.service. May 10 00:36:26.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:26.713498 systemd[1]: Starting systemd-udev-settle.service... May 10 00:36:26.721266 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:36:27.387965 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:36:27.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.389000 audit: BPF prog-id=24 op=LOAD May 10 00:36:27.389000 audit: BPF prog-id=25 op=LOAD May 10 00:36:27.389000 audit: BPF prog-id=7 op=UNLOAD May 10 00:36:27.389000 audit: BPF prog-id=8 op=UNLOAD May 10 00:36:27.391031 systemd[1]: Starting systemd-udevd.service... May 10 00:36:27.412842 systemd-udevd[1013]: Using default interface naming scheme 'v252'. May 10 00:36:27.429479 systemd[1]: Started systemd-udevd.service. May 10 00:36:27.432686 systemd[1]: Starting systemd-networkd.service... May 10 00:36:27.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.430000 audit: BPF prog-id=26 op=LOAD May 10 00:36:27.444000 audit: BPF prog-id=27 op=LOAD May 10 00:36:27.445000 audit: BPF prog-id=28 op=LOAD May 10 00:36:27.445000 audit: BPF prog-id=29 op=LOAD May 10 00:36:27.446905 systemd[1]: Starting systemd-userdbd.service... May 10 00:36:27.477817 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:36:27.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.479606 systemd[1]: Started systemd-userdbd.service. May 10 00:36:27.497934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:36:27.529030 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:36:27.533019 kernel: ACPI: button: Power Button [PWRF] May 10 00:36:27.533651 systemd-networkd[1022]: lo: Link UP May 10 00:36:27.533660 systemd-networkd[1022]: lo: Gained carrier May 10 00:36:27.534065 systemd-networkd[1022]: Enumeration completed May 10 00:36:27.534185 systemd[1]: Started systemd-networkd.service. May 10 00:36:27.534772 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:36:27.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.536137 systemd-networkd[1022]: eth0: Link UP May 10 00:36:27.536144 systemd-networkd[1022]: eth0: Gained carrier May 10 00:36:27.540000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:36:27.540000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55aec536a4a0 a1=338ac a2=7f546f5d6bc5 a3=5 items=110 ppid=1013 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:27.540000 audit: CWD cwd="/" May 10 00:36:27.540000 audit: PATH item=0 name=(null) inode=2064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=1 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=2 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=3 name=(null) inode=13565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=4 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=5 name=(null) inode=13566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=6 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=7 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=8 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=9 name=(null) inode=13568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=10 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=11 name=(null) inode=13569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=12 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=13 name=(null) inode=13570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=14 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=15 name=(null) inode=13571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=16 name=(null) inode=13567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=17 name=(null) inode=13572 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=18 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=19 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=20 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=21 name=(null) inode=13574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=22 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=23 name=(null) inode=13575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=24 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=25 name=(null) inode=13576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=26 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=27 name=(null) inode=13577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=28 name=(null) inode=13573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=29 name=(null) inode=13578 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=30 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=31 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=32 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=33 name=(null) inode=13580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=34 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=35 name=(null) inode=13581 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=36 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=37 name=(null) inode=13582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=38 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=39 name=(null) inode=13583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=40 name=(null) inode=13579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=41 name=(null) inode=13584 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=42 name=(null) inode=13564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=43 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=44 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=45 name=(null) inode=13586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=46 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=47 name=(null) inode=13587 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=48 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=49 name=(null) inode=13588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=50 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=51 name=(null) inode=13589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=52 name=(null) inode=13585 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=53 name=(null) inode=13590 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=54 name=(null) inode=2064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=55 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=56 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=57 name=(null) inode=13592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=58 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=59 name=(null) inode=13593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=60 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=61 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=62 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=63 name=(null) inode=13595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=64 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=65 name=(null) inode=13596 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=66 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=67 name=(null) inode=13597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=68 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=69 name=(null) inode=13598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=70 name=(null) inode=13594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=71 name=(null) inode=13599 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=72 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=73 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=74 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=75 name=(null) inode=13601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=76 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=77 name=(null) inode=13602 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.551267 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.27/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:36:27.540000 audit: PATH item=78 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=79 name=(null) inode=13603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=80 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=81 name=(null) inode=13604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=82 name=(null) inode=13600 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=83 name=(null) inode=13605 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=84 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=85 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=86 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=87 name=(null) inode=13607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=88 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=89 name=(null) inode=13608 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=90 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=91 name=(null) inode=13609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=92 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=93 name=(null) inode=13610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=94 name=(null) inode=13606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=95 name=(null) inode=13611 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=96 name=(null) inode=13591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=97 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=98 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=99 name=(null) inode=13613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=100 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=101 name=(null) inode=13614 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=102 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=103 name=(null) inode=13615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=104 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=105 name=(null) inode=13616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=106 name=(null) inode=13612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=107 name=(null) inode=13617 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PATH item=109 name=(null) inode=13618 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:27.540000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:36:27.572070 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:36:27.612525 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:36:27.615535 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 10 00:36:27.617926 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:36:27.618065 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:36:27.618213 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:36:27.640488 kernel: kvm: Nested Virtualization enabled May 10 00:36:27.640544 kernel: SVM: kvm: Nested Paging enabled May 10 00:36:27.640559 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:36:27.640572 kernel: SVM: Virtual GIF supported May 10 00:36:27.656021 kernel: EDAC MC: Ver: 3.0.0 May 10 00:36:27.677409 systemd[1]: Finished systemd-udev-settle.service. May 10 00:36:27.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.679444 systemd[1]: Starting lvm2-activation-early.service... May 10 00:36:27.687631 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:36:27.713103 systemd[1]: Finished lvm2-activation-early.service. May 10 00:36:27.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.714272 systemd[1]: Reached target cryptsetup.target. May 10 00:36:27.716448 systemd[1]: Starting lvm2-activation.service... May 10 00:36:27.720469 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:36:27.747287 systemd[1]: Finished lvm2-activation.service. May 10 00:36:27.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.748376 systemd[1]: Reached target local-fs-pre.target. May 10 00:36:27.749287 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:36:27.749322 systemd[1]: Reached target local-fs.target. May 10 00:36:27.750181 systemd[1]: Reached target machines.target. May 10 00:36:27.752438 systemd[1]: Starting ldconfig.service... May 10 00:36:27.753492 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:36:27.753570 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:27.754573 systemd[1]: Starting systemd-boot-update.service... May 10 00:36:27.756466 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:36:27.759033 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:36:27.761280 systemd[1]: Starting systemd-sysext.service... May 10 00:36:27.762587 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) May 10 00:36:27.763780 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:36:27.770776 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:36:27.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.776565 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:36:27.780664 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:36:27.780816 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:36:27.790092 kernel: loop0: detected capacity change from 0 to 218376 May 10 00:36:27.828090 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) May 10 00:36:27.828090 systemd-fsck[1061]: /dev/vda1: 791 files, 120708/258078 clusters May 10 00:36:27.830401 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:36:27.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.833950 systemd[1]: Mounting boot.mount... May 10 00:36:27.850531 systemd[1]: Mounted boot.mount. May 10 00:36:27.959562 systemd[1]: Finished systemd-boot-update.service. May 10 00:36:27.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.984026 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:36:27.984670 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:36:27.985244 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:36:27.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:27.998020 kernel: loop1: detected capacity change from 0 to 218376 May 10 00:36:28.003812 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 10 00:36:28.004191 (sd-sysext)[1066]: Merged extensions into '/usr'. May 10 00:36:28.020928 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:28.022720 systemd[1]: Mounting usr-share-oem.mount... May 10 00:36:28.023823 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:36:28.027081 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:36:28.029232 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:36:28.031309 systemd[1]: Starting modprobe@loop.service... May 10 00:36:28.032316 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:36:28.032478 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:28.032593 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:28.035332 systemd[1]: Mounted usr-share-oem.mount. May 10 00:36:28.036601 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:36:28.036715 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:36:28.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.038104 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:36:28.038220 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:36:28.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.039622 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:36:28.039728 systemd[1]: Finished modprobe@loop.service. May 10 00:36:28.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.042126 systemd[1]: Finished systemd-sysext.service. May 10 00:36:28.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.045383 systemd[1]: Starting ensure-sysext.service... May 10 00:36:28.046320 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:36:28.046369 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:36:28.047327 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:36:28.052291 systemd[1]: Reloading. May 10 00:36:28.110760 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:36:28.114417 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:36:28.118244 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:36:28.120644 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:36:28.175534 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-10T00:36:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:36:28.175562 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-10T00:36:28Z" level=info msg="torcx already run" May 10 00:36:28.240114 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:36:28.240136 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:36:28.259561 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:36:28.324000 audit: BPF prog-id=30 op=LOAD May 10 00:36:28.326238 kernel: kauditd_printk_skb: 205 callbacks suppressed May 10 00:36:28.326301 kernel: audit: type=1334 audit(1746837388.324:167): prog-id=30 op=LOAD May 10 00:36:28.324000 audit: BPF prog-id=27 op=UNLOAD May 10 00:36:28.328403 kernel: audit: type=1334 audit(1746837388.324:168): prog-id=27 op=UNLOAD May 10 00:36:28.328459 kernel: audit: type=1334 audit(1746837388.326:169): prog-id=31 op=LOAD May 10 00:36:28.326000 audit: BPF prog-id=31 op=LOAD May 10 00:36:28.329584 kernel: audit: type=1334 audit(1746837388.327:170): prog-id=32 op=LOAD May 10 00:36:28.327000 audit: BPF prog-id=32 op=LOAD May 10 00:36:28.327000 audit: BPF prog-id=28 op=UNLOAD May 10 00:36:28.331737 kernel: audit: type=1334 audit(1746837388.327:171): prog-id=28 op=UNLOAD May 10 00:36:28.331782 kernel: audit: type=1334 audit(1746837388.327:172): prog-id=29 op=UNLOAD May 10 00:36:28.327000 audit: BPF prog-id=29 op=UNLOAD May 10 00:36:28.332801 kernel: audit: type=1334 audit(1746837388.329:173): prog-id=33 op=LOAD May 10 00:36:28.329000 audit: BPF prog-id=33 op=LOAD May 10 00:36:28.333898 kernel: audit: type=1334 audit(1746837388.329:174): prog-id=26 op=UNLOAD May 10 00:36:28.329000 audit: BPF prog-id=26 op=UNLOAD May 10 00:36:28.332000 audit: BPF prog-id=34 op=LOAD May 10 00:36:28.336426 kernel: audit: type=1334 audit(1746837388.332:175): prog-id=34 op=LOAD May 10 00:36:28.336473 kernel: audit: type=1334 audit(1746837388.335:176): prog-id=35 op=LOAD May 10 00:36:28.335000 audit: BPF prog-id=35 op=LOAD May 10 00:36:28.335000 audit: BPF prog-id=24 op=UNLOAD May 10 00:36:28.335000 audit: BPF prog-id=25 op=UNLOAD May 10 00:36:28.336000 audit: BPF prog-id=36 op=LOAD May 10 00:36:28.336000 audit: BPF prog-id=21 op=UNLOAD May 10 00:36:28.336000 audit: BPF prog-id=37 op=LOAD May 10 00:36:28.336000 audit: BPF prog-id=38 op=LOAD May 10 00:36:28.336000 audit: BPF prog-id=22 op=UNLOAD May 10 00:36:28.336000 audit: BPF prog-id=23 op=UNLOAD May 10 00:36:28.341702 systemd[1]: Finished ldconfig.service. May 10 00:36:28.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.344710 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:36:28.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.352817 systemd[1]: Starting audit-rules.service... May 10 00:36:28.354906 systemd[1]: Starting clean-ca-certificates.service... May 10 00:36:28.358000 audit: BPF prog-id=39 op=LOAD May 10 00:36:28.357297 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:36:28.360715 systemd[1]: Starting systemd-resolved.service... May 10 00:36:28.366000 audit: BPF prog-id=40 op=LOAD May 10 00:36:28.368813 systemd[1]: Starting systemd-timesyncd.service... May 10 00:36:28.370943 systemd[1]: Starting systemd-update-utmp.service... May 10 00:36:28.372873 systemd[1]: Finished clean-ca-certificates.service. May 10 00:36:28.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.374000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:36:28.379202 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:36:28.380716 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:36:28.382735 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:36:28.384675 systemd[1]: Starting modprobe@loop.service... May 10 00:36:28.385611 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:36:28.385768 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:28.385910 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:36:28.387357 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:36:28.387481 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:36:28.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.388836 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:36:28.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:28.391374 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:36:28.391495 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:36:28.390000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:36:28.390000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc774a6820 a2=420 a3=0 items=0 ppid=1137 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:28.390000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:36:28.392540 augenrules[1160]: No rules May 10 00:36:28.392918 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:36:28.393158 systemd[1]: Finished modprobe@loop.service. May 10 00:36:28.394618 systemd[1]: Finished audit-rules.service. May 10 00:36:28.397844 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:36:28.399345 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:36:28.401193 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:36:28.403148 systemd[1]: Starting modprobe@loop.service... May 10 00:36:28.404025 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:36:28.404162 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:28.405706 systemd[1]: Starting systemd-update-done.service... May 10 00:36:28.406623 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:36:28.407675 systemd[1]: Finished systemd-update-utmp.service. May 10 00:36:28.409182 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:36:28.409312 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:36:28.410655 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:36:28.410911 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:36:28.412286 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:36:28.412507 systemd[1]: Finished modprobe@loop.service. May 10 00:36:28.413925 systemd[1]: Finished systemd-update-done.service. May 10 00:36:28.418773 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:36:28.420675 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:36:28.423220 systemd[1]: Starting modprobe@drm.service... May 10 00:36:28.425745 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:36:28.428029 systemd[1]: Starting modprobe@loop.service... May 10 00:36:28.428948 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:36:28.429341 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:28.430631 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:36:28.431961 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:36:28.433594 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:36:28.433790 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:36:28.435449 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:36:28.435577 systemd[1]: Finished modprobe@drm.service. May 10 00:36:28.436958 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:36:28.437110 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:36:28.437486 systemd-resolved[1144]: Positive Trust Anchors: May 10 00:36:28.437500 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:36:28.437526 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:36:28.438684 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:36:28.438816 systemd[1]: Finished modprobe@loop.service. May 10 00:36:28.440550 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:36:28.440671 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:36:28.442246 systemd[1]: Finished ensure-sysext.service. May 10 00:36:28.446216 systemd-resolved[1144]: Defaulting to hostname 'linux'. May 10 00:36:28.447702 systemd[1]: Started systemd-resolved.service. May 10 00:36:28.448793 systemd[1]: Reached target network.target. May 10 00:36:28.449745 systemd[1]: Reached target nss-lookup.target. May 10 00:36:28.457292 systemd[1]: Started systemd-timesyncd.service. May 10 00:36:28.458743 systemd[1]: Reached target sysinit.target. May 10 00:36:29.073383 systemd-resolved[1144]: Clock change detected. Flushing caches. May 10 00:36:29.073455 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:36:29.073532 systemd-timesyncd[1147]: Initial clock synchronization to Sat 2025-05-10 00:36:29.073293 UTC. May 10 00:36:29.074028 systemd[1]: Started motdgen.path. May 10 00:36:29.074834 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:36:29.076101 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:36:29.077122 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:36:29.077150 systemd[1]: Reached target paths.target. May 10 00:36:29.078060 systemd[1]: Reached target time-set.target. May 10 00:36:29.079359 systemd[1]: Started logrotate.timer. May 10 00:36:29.080302 systemd[1]: Started mdadm.timer. May 10 00:36:29.081084 systemd[1]: Reached target timers.target. May 10 00:36:29.082501 systemd[1]: Listening on dbus.socket. May 10 00:36:29.084711 systemd[1]: Starting docker.socket... May 10 00:36:29.088097 systemd[1]: Listening on sshd.socket. May 10 00:36:29.089078 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:29.089707 systemd[1]: Listening on docker.socket. May 10 00:36:29.090790 systemd[1]: Reached target sockets.target. May 10 00:36:29.091668 systemd[1]: Reached target basic.target. May 10 00:36:29.092569 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:36:29.092598 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:36:29.093836 systemd[1]: Starting containerd.service... May 10 00:36:29.095784 systemd[1]: Starting dbus.service... May 10 00:36:29.097736 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:36:29.099870 systemd[1]: Starting extend-filesystems.service... May 10 00:36:29.100807 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:36:29.102051 systemd[1]: Starting motdgen.service... May 10 00:36:29.103962 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:36:29.106779 systemd[1]: Starting sshd-keygen.service... May 10 00:36:29.120663 extend-filesystems[1181]: Found loop1 May 10 00:36:29.120663 extend-filesystems[1181]: Found sr0 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda May 10 00:36:29.120663 extend-filesystems[1181]: Found vda1 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda2 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda3 May 10 00:36:29.120663 extend-filesystems[1181]: Found usr May 10 00:36:29.120663 extend-filesystems[1181]: Found vda4 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda6 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda7 May 10 00:36:29.120663 extend-filesystems[1181]: Found vda9 May 10 00:36:29.120663 extend-filesystems[1181]: Checking size of /dev/vda9 May 10 00:36:29.161726 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:36:29.161755 jq[1180]: false May 10 00:36:29.156481 dbus-daemon[1179]: [system] SELinux support is enabled May 10 00:36:29.136785 systemd[1]: Starting systemd-logind.service... May 10 00:36:29.201049 extend-filesystems[1181]: Resized partition /dev/vda9 May 10 00:36:29.138043 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:36:29.203310 extend-filesystems[1202]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:36:29.138129 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:36:29.138802 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:36:29.204963 jq[1204]: true May 10 00:36:29.139677 systemd[1]: Starting update-engine.service... May 10 00:36:29.142969 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:36:29.213756 jq[1206]: true May 10 00:36:29.152339 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:36:29.152559 systemd[1]: Finished motdgen.service. May 10 00:36:29.156158 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:36:29.180837 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:36:29.182308 systemd[1]: Started dbus.service. May 10 00:36:29.186359 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:36:29.186568 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:36:29.208278 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:36:29.208328 systemd[1]: Reached target system-config.target. May 10 00:36:29.209519 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:36:29.209551 systemd[1]: Reached target user-config.target. May 10 00:36:29.224280 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:36:29.300575 update_engine[1203]: I0510 00:36:29.280894 1203 main.cc:92] Flatcar Update Engine starting May 10 00:36:29.300575 update_engine[1203]: I0510 00:36:29.299413 1203 update_check_scheduler.cc:74] Next update check in 11m10s May 10 00:36:29.290652 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:36:29.302175 extend-filesystems[1202]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:36:29.302175 extend-filesystems[1202]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:36:29.302175 extend-filesystems[1202]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:36:29.290920 systemd[1]: Finished extend-filesystems.service. May 10 00:36:29.307963 extend-filesystems[1181]: Resized filesystem in /dev/vda9 May 10 00:36:29.300892 systemd[1]: Started update-engine.service. May 10 00:36:29.304844 systemd[1]: Started locksmithd.service. May 10 00:36:29.314755 systemd-logind[1198]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:36:29.315013 systemd-logind[1198]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:36:29.316800 systemd-logind[1198]: New seat seat0. May 10 00:36:29.323023 systemd[1]: Started systemd-logind.service. May 10 00:36:29.328630 bash[1229]: Updated "/home/core/.ssh/authorized_keys" May 10 00:36:29.329254 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:36:29.364965 env[1207]: time="2025-05-10T00:36:29.364813460Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:36:29.387142 env[1207]: time="2025-05-10T00:36:29.387052614Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:36:29.387394 env[1207]: time="2025-05-10T00:36:29.387366543Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.396283 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:29.396342 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:36:29.411999 env[1207]: time="2025-05-10T00:36:29.411471056Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:36:29.411999 env[1207]: time="2025-05-10T00:36:29.411568940Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.412310 env[1207]: time="2025-05-10T00:36:29.412273211Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:36:29.412346 env[1207]: time="2025-05-10T00:36:29.412315710Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.412380 env[1207]: time="2025-05-10T00:36:29.412356968Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:36:29.412442 env[1207]: time="2025-05-10T00:36:29.412392775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.412635 env[1207]: time="2025-05-10T00:36:29.412595525Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.413399 env[1207]: time="2025-05-10T00:36:29.413365670Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:36:29.413822 env[1207]: time="2025-05-10T00:36:29.413759569Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:36:29.413906 env[1207]: time="2025-05-10T00:36:29.413825743Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:36:29.413969 env[1207]: time="2025-05-10T00:36:29.413944486Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:36:29.414018 env[1207]: time="2025-05-10T00:36:29.413978730Z" level=info msg="metadata content store policy set" policy=shared May 10 00:36:29.420417 env[1207]: time="2025-05-10T00:36:29.420347806Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:36:29.420417 env[1207]: time="2025-05-10T00:36:29.420407749Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:36:29.420505 env[1207]: time="2025-05-10T00:36:29.420440140Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:36:29.420540 env[1207]: time="2025-05-10T00:36:29.420516793Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420540 env[1207]: time="2025-05-10T00:36:29.420534046Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420578 env[1207]: time="2025-05-10T00:36:29.420546860Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420578 env[1207]: time="2025-05-10T00:36:29.420558512Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420632 env[1207]: time="2025-05-10T00:36:29.420578319Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420632 env[1207]: time="2025-05-10T00:36:29.420593858Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420632 env[1207]: time="2025-05-10T00:36:29.420607113Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420632 env[1207]: time="2025-05-10T00:36:29.420626429Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:36:29.420704 env[1207]: time="2025-05-10T00:36:29.420647028Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:36:29.420914 env[1207]: time="2025-05-10T00:36:29.420762194Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:36:29.420914 env[1207]: time="2025-05-10T00:36:29.420881638Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:36:29.421210 env[1207]: time="2025-05-10T00:36:29.421175429Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:36:29.421284 env[1207]: time="2025-05-10T00:36:29.421217618Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421284 env[1207]: time="2025-05-10T00:36:29.421229260Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:36:29.421367 env[1207]: time="2025-05-10T00:36:29.421309099Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421367 env[1207]: time="2025-05-10T00:36:29.421324308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421367 env[1207]: time="2025-05-10T00:36:29.421349135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421367 env[1207]: time="2025-05-10T00:36:29.421362480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421451 env[1207]: time="2025-05-10T00:36:29.421376376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421451 env[1207]: time="2025-05-10T00:36:29.421390272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421451 env[1207]: time="2025-05-10T00:36:29.421403587Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421451 env[1207]: time="2025-05-10T00:36:29.421413966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421451 env[1207]: time="2025-05-10T00:36:29.421426630Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:36:29.421625 env[1207]: time="2025-05-10T00:36:29.421583494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421625 env[1207]: time="2025-05-10T00:36:29.421627507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421707 env[1207]: time="2025-05-10T00:36:29.421646182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:36:29.421707 env[1207]: time="2025-05-10T00:36:29.421658184Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:36:29.421707 env[1207]: time="2025-05-10T00:36:29.421672140Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:36:29.421707 env[1207]: time="2025-05-10T00:36:29.421682790Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:36:29.421832 env[1207]: time="2025-05-10T00:36:29.421704681Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:36:29.421832 env[1207]: time="2025-05-10T00:36:29.421746249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:36:29.422153 env[1207]: time="2025-05-10T00:36:29.422057734Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:36:29.422153 env[1207]: time="2025-05-10T00:36:29.422151329Z" level=info msg="Connect containerd service" May 10 00:36:29.423381 env[1207]: time="2025-05-10T00:36:29.422185854Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:36:29.423381 env[1207]: time="2025-05-10T00:36:29.422957912Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:36:29.423478 env[1207]: time="2025-05-10T00:36:29.423455385Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:36:29.423533 env[1207]: time="2025-05-10T00:36:29.423504858Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:36:29.423578 env[1207]: time="2025-05-10T00:36:29.423473439Z" level=info msg="Start subscribing containerd event" May 10 00:36:29.423639 systemd[1]: Started containerd.service. May 10 00:36:29.425807 env[1207]: time="2025-05-10T00:36:29.425768965Z" level=info msg="Start recovering state" May 10 00:36:29.425925 env[1207]: time="2025-05-10T00:36:29.425261914Z" level=info msg="containerd successfully booted in 0.062414s" May 10 00:36:29.426036 env[1207]: time="2025-05-10T00:36:29.426012692Z" level=info msg="Start event monitor" May 10 00:36:29.426078 env[1207]: time="2025-05-10T00:36:29.426043840Z" level=info msg="Start snapshots syncer" May 10 00:36:29.426078 env[1207]: time="2025-05-10T00:36:29.426061163Z" level=info msg="Start cni network conf syncer for default" May 10 00:36:29.426140 env[1207]: time="2025-05-10T00:36:29.426077804Z" level=info msg="Start streaming server" May 10 00:36:29.432940 locksmithd[1225]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:36:29.656408 systemd-networkd[1022]: eth0: Gained IPv6LL May 10 00:36:29.658369 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:36:29.659834 systemd[1]: Reached target network-online.target. May 10 00:36:29.662552 systemd[1]: Starting kubelet.service... May 10 00:36:29.953626 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:36:29.977179 systemd[1]: Finished sshd-keygen.service. May 10 00:36:29.979752 systemd[1]: Starting issuegen.service... May 10 00:36:29.985686 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:36:29.985828 systemd[1]: Finished issuegen.service. May 10 00:36:29.988089 systemd[1]: Starting systemd-user-sessions.service... May 10 00:36:29.996577 systemd[1]: Finished systemd-user-sessions.service. May 10 00:36:29.999818 systemd[1]: Started getty@tty1.service. May 10 00:36:30.002313 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:36:30.003643 systemd[1]: Reached target getty.target. May 10 00:36:31.355017 systemd[1]: Started kubelet.service. May 10 00:36:31.356442 systemd[1]: Reached target multi-user.target. May 10 00:36:31.358697 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:36:31.365494 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:36:31.365658 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:36:31.366847 systemd[1]: Startup finished in 761ms (kernel) + 4.335s (initrd) + 7.637s (userspace) = 12.734s. May 10 00:36:31.929204 kubelet[1256]: E0510 00:36:31.929127 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:36:31.931354 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:36:31.931482 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:36:31.931735 systemd[1]: kubelet.service: Consumed 2.116s CPU time. May 10 00:36:32.369849 systemd[1]: Created slice system-sshd.slice. May 10 00:36:32.371291 systemd[1]: Started sshd@0-10.0.0.27:22-10.0.0.1:60020.service. May 10 00:36:32.419577 sshd[1265]: Accepted publickey for core from 10.0.0.1 port 60020 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:32.421306 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.430336 systemd-logind[1198]: New session 1 of user core. May 10 00:36:32.431194 systemd[1]: Created slice user-500.slice. May 10 00:36:32.432436 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:36:32.440830 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:36:32.442607 systemd[1]: Starting user@500.service... May 10 00:36:32.445660 (systemd)[1268]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.529691 systemd[1268]: Queued start job for default target default.target. May 10 00:36:32.530328 systemd[1268]: Reached target paths.target. May 10 00:36:32.530356 systemd[1268]: Reached target sockets.target. May 10 00:36:32.530373 systemd[1268]: Reached target timers.target. May 10 00:36:32.530388 systemd[1268]: Reached target basic.target. May 10 00:36:32.530437 systemd[1268]: Reached target default.target. May 10 00:36:32.530468 systemd[1268]: Startup finished in 79ms. May 10 00:36:32.530604 systemd[1]: Started user@500.service. May 10 00:36:32.531871 systemd[1]: Started session-1.scope. May 10 00:36:32.584223 systemd[1]: Started sshd@1-10.0.0.27:22-10.0.0.1:60028.service. May 10 00:36:32.625702 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 60028 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:32.627162 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.631389 systemd-logind[1198]: New session 2 of user core. May 10 00:36:32.632594 systemd[1]: Started session-2.scope. May 10 00:36:32.688354 sshd[1277]: pam_unix(sshd:session): session closed for user core May 10 00:36:32.691497 systemd[1]: sshd@1-10.0.0.27:22-10.0.0.1:60028.service: Deactivated successfully. May 10 00:36:32.692180 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:36:32.692751 systemd-logind[1198]: Session 2 logged out. Waiting for processes to exit. May 10 00:36:32.694004 systemd[1]: Started sshd@2-10.0.0.27:22-10.0.0.1:60038.service. May 10 00:36:32.694775 systemd-logind[1198]: Removed session 2. May 10 00:36:32.738297 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 60038 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:32.739519 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.743099 systemd-logind[1198]: New session 3 of user core. May 10 00:36:32.744108 systemd[1]: Started session-3.scope. May 10 00:36:32.796360 sshd[1283]: pam_unix(sshd:session): session closed for user core May 10 00:36:32.799189 systemd[1]: sshd@2-10.0.0.27:22-10.0.0.1:60038.service: Deactivated successfully. May 10 00:36:32.799814 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:36:32.800402 systemd-logind[1198]: Session 3 logged out. Waiting for processes to exit. May 10 00:36:32.801470 systemd[1]: Started sshd@3-10.0.0.27:22-10.0.0.1:60042.service. May 10 00:36:32.802304 systemd-logind[1198]: Removed session 3. May 10 00:36:32.842701 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 60042 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:32.844335 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.847980 systemd-logind[1198]: New session 4 of user core. May 10 00:36:32.848835 systemd[1]: Started session-4.scope. May 10 00:36:32.903200 sshd[1290]: pam_unix(sshd:session): session closed for user core May 10 00:36:32.905979 systemd[1]: sshd@3-10.0.0.27:22-10.0.0.1:60042.service: Deactivated successfully. May 10 00:36:32.906615 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:36:32.907175 systemd-logind[1198]: Session 4 logged out. Waiting for processes to exit. May 10 00:36:32.908199 systemd[1]: Started sshd@4-10.0.0.27:22-10.0.0.1:60052.service. May 10 00:36:32.909061 systemd-logind[1198]: Removed session 4. May 10 00:36:32.948332 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 60052 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:32.949583 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:32.953046 systemd-logind[1198]: New session 5 of user core. May 10 00:36:32.953873 systemd[1]: Started session-5.scope. May 10 00:36:33.010556 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:36:33.010792 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:36:33.020484 dbus-daemon[1179]: Н\xa0\x93\u001fV: received setenforce notice (enforcing=427238160) May 10 00:36:33.022803 sudo[1300]: pam_unix(sudo:session): session closed for user root May 10 00:36:33.024668 sshd[1296]: pam_unix(sshd:session): session closed for user core May 10 00:36:33.027585 systemd[1]: sshd@4-10.0.0.27:22-10.0.0.1:60052.service: Deactivated successfully. May 10 00:36:33.028265 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:36:33.028857 systemd-logind[1198]: Session 5 logged out. Waiting for processes to exit. May 10 00:36:33.030144 systemd[1]: Started sshd@5-10.0.0.27:22-10.0.0.1:60064.service. May 10 00:36:33.030885 systemd-logind[1198]: Removed session 5. May 10 00:36:33.071837 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 60064 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:33.073269 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:33.076859 systemd-logind[1198]: New session 6 of user core. May 10 00:36:33.077638 systemd[1]: Started session-6.scope. May 10 00:36:33.131891 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:36:33.132165 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:36:33.135282 sudo[1308]: pam_unix(sudo:session): session closed for user root May 10 00:36:33.141035 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:36:33.141253 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:36:33.152072 systemd[1]: Stopping audit-rules.service... May 10 00:36:33.151000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:36:33.151000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff27997a30 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:33.151000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:36:33.153462 auditctl[1311]: No rules May 10 00:36:33.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:33.153500 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:36:33.153683 systemd[1]: Stopped audit-rules.service. May 10 00:36:33.155490 systemd[1]: Starting audit-rules.service... May 10 00:36:33.174054 augenrules[1328]: No rules May 10 00:36:33.174728 systemd[1]: Finished audit-rules.service. May 10 00:36:33.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:33.175587 sudo[1307]: pam_unix(sudo:session): session closed for user root May 10 00:36:33.174000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:33.174000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:33.177214 sshd[1304]: pam_unix(sshd:session): session closed for user core May 10 00:36:33.177000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.177000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.27:22-10.0.0.1:60064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:33.179849 systemd[1]: sshd@5-10.0.0.27:22-10.0.0.1:60064.service: Deactivated successfully. May 10 00:36:33.180396 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:36:33.180977 systemd-logind[1198]: Session 6 logged out. Waiting for processes to exit. May 10 00:36:33.182288 systemd[1]: Started sshd@6-10.0.0.27:22-10.0.0.1:60074.service. May 10 00:36:33.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.27:22-10.0.0.1:60074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:33.183117 systemd-logind[1198]: Removed session 6. May 10 00:36:33.222000 audit[1334]: USER_ACCT pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.224335 sshd[1334]: Accepted publickey for core from 10.0.0.1 port 60074 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:33.223000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.223000 audit[1334]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe32b4f000 a2=3 a3=0 items=0 ppid=1 pid=1334 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:33.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:33.225580 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:33.229348 systemd-logind[1198]: New session 7 of user core. May 10 00:36:33.230251 systemd[1]: Started session-7.scope. May 10 00:36:33.233000 audit[1334]: USER_START pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.234000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:33.282000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:33.282000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:33.283470 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:36:33.283687 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:36:33.284000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:33.295874 systemd[1]: Starting coreos-metadata.service... May 10 00:36:33.302716 systemd[1]: coreos-metadata.service: Deactivated successfully. May 10 00:36:33.302905 systemd[1]: Finished coreos-metadata.service. May 10 00:36:33.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:33.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.346408 systemd[1]: Stopped kubelet.service. May 10 00:36:34.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.347323 systemd[1]: kubelet.service: Consumed 2.116s CPU time. May 10 00:36:34.347597 kernel: kauditd_printk_skb: 43 callbacks suppressed May 10 00:36:34.347649 kernel: audit: type=1130 audit(1746837394.345:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.351806 systemd[1]: Starting kubelet.service... May 10 00:36:34.354584 kernel: audit: type=1131 audit(1746837394.346:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.378488 systemd[1]: Reloading. May 10 00:36:34.469850 /usr/lib/systemd/system-generators/torcx-generator[1394]: time="2025-05-10T00:36:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:36:34.469881 /usr/lib/systemd/system-generators/torcx-generator[1394]: time="2025-05-10T00:36:34Z" level=info msg="torcx already run" May 10 00:36:34.579065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:36:34.579092 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:36:34.601445 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:36:34.694923 kernel: audit: type=1400 audit(1746837394.682:216): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.695078 kernel: audit: type=1400 audit(1746837394.682:217): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.695100 kernel: audit: type=1400 audit(1746837394.682:218): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.703152 kernel: audit: type=1400 audit(1746837394.682:219): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.703372 kernel: audit: type=1400 audit(1746837394.682:220): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.703403 kernel: audit: type=1400 audit(1746837394.682:221): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.707065 kernel: audit: type=1400 audit(1746837394.682:222): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.711696 kernel: audit: type=1400 audit(1746837394.682:223): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit: BPF prog-id=46 op=LOAD May 10 00:36:34.686000 audit: BPF prog-id=30 op=UNLOAD May 10 00:36:34.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.689000 audit: BPF prog-id=47 op=LOAD May 10 00:36:34.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.693000 audit: BPF prog-id=48 op=LOAD May 10 00:36:34.693000 audit: BPF prog-id=31 op=UNLOAD May 10 00:36:34.693000 audit: BPF prog-id=32 op=UNLOAD May 10 00:36:34.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.698000 audit: BPF prog-id=49 op=LOAD May 10 00:36:34.698000 audit: BPF prog-id=33 op=UNLOAD May 10 00:36:34.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit: BPF prog-id=50 op=LOAD May 10 00:36:34.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.715000 audit: BPF prog-id=51 op=LOAD May 10 00:36:34.715000 audit: BPF prog-id=34 op=UNLOAD May 10 00:36:34.715000 audit: BPF prog-id=35 op=UNLOAD May 10 00:36:34.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.716000 audit: BPF prog-id=52 op=LOAD May 10 00:36:34.716000 audit: BPF prog-id=40 op=UNLOAD May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit: BPF prog-id=53 op=LOAD May 10 00:36:34.717000 audit: BPF prog-id=36 op=UNLOAD May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit: BPF prog-id=54 op=LOAD May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.718000 audit: BPF prog-id=55 op=LOAD May 10 00:36:34.718000 audit: BPF prog-id=37 op=UNLOAD May 10 00:36:34.718000 audit: BPF prog-id=38 op=UNLOAD May 10 00:36:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.719000 audit: BPF prog-id=56 op=LOAD May 10 00:36:34.719000 audit: BPF prog-id=39 op=UNLOAD May 10 00:36:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit: BPF prog-id=57 op=LOAD May 10 00:36:34.722000 audit: BPF prog-id=41 op=UNLOAD May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit: BPF prog-id=58 op=LOAD May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit: BPF prog-id=59 op=LOAD May 10 00:36:34.722000 audit: BPF prog-id=42 op=UNLOAD May 10 00:36:34.722000 audit: BPF prog-id=43 op=UNLOAD May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:34.722000 audit: BPF prog-id=60 op=LOAD May 10 00:36:34.722000 audit: BPF prog-id=44 op=UNLOAD May 10 00:36:34.736716 systemd[1]: Started kubelet.service. May 10 00:36:34.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.741477 systemd[1]: Stopping kubelet.service... May 10 00:36:34.742341 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:36:34.742580 systemd[1]: Stopped kubelet.service. May 10 00:36:34.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.744729 systemd[1]: Starting kubelet.service... May 10 00:36:34.837753 systemd[1]: Started kubelet.service. May 10 00:36:34.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:34.894583 kubelet[1444]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:34.894583 kubelet[1444]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:36:34.894583 kubelet[1444]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:34.895203 kubelet[1444]: I0510 00:36:34.894573 1444 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:36:35.238952 kubelet[1444]: I0510 00:36:35.238868 1444 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:36:35.238952 kubelet[1444]: I0510 00:36:35.238911 1444 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:36:35.239272 kubelet[1444]: I0510 00:36:35.239232 1444 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:36:35.279511 kubelet[1444]: I0510 00:36:35.279458 1444 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:36:35.322134 kubelet[1444]: E0510 00:36:35.322086 1444 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:36:35.322134 kubelet[1444]: I0510 00:36:35.322129 1444 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:36:35.326923 kubelet[1444]: I0510 00:36:35.326802 1444 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:36:35.336379 kubelet[1444]: I0510 00:36:35.336283 1444 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:36:35.336609 kubelet[1444]: I0510 00:36:35.336376 1444 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.27","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:36:35.336781 kubelet[1444]: I0510 00:36:35.336617 1444 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:36:35.336781 kubelet[1444]: I0510 00:36:35.336629 1444 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:36:35.336859 kubelet[1444]: I0510 00:36:35.336793 1444 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:35.346212 kubelet[1444]: I0510 00:36:35.346146 1444 kubelet.go:446] "Attempting to sync node with API server" May 10 00:36:35.346212 kubelet[1444]: I0510 00:36:35.346189 1444 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:36:35.346212 kubelet[1444]: I0510 00:36:35.346213 1444 kubelet.go:352] "Adding apiserver pod source" May 10 00:36:35.346212 kubelet[1444]: I0510 00:36:35.346225 1444 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:36:35.346451 kubelet[1444]: E0510 00:36:35.346396 1444 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:35.346594 kubelet[1444]: E0510 00:36:35.346543 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:35.366000 kubelet[1444]: I0510 00:36:35.365961 1444 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:36:35.366442 kubelet[1444]: I0510 00:36:35.366423 1444 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:36:35.367050 kubelet[1444]: W0510 00:36:35.366992 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.27" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 00:36:35.367271 kubelet[1444]: E0510 00:36:35.367059 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.27\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 10 00:36:35.367271 kubelet[1444]: W0510 00:36:35.367074 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 00:36:35.367271 kubelet[1444]: E0510 00:36:35.367102 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 10 00:36:35.367271 kubelet[1444]: W0510 00:36:35.367223 1444 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:36:35.372272 kubelet[1444]: I0510 00:36:35.372247 1444 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:36:35.372366 kubelet[1444]: I0510 00:36:35.372296 1444 server.go:1287] "Started kubelet" May 10 00:36:35.372410 kubelet[1444]: I0510 00:36:35.372356 1444 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:36:35.373361 kubelet[1444]: I0510 00:36:35.373322 1444 server.go:490] "Adding debug handlers to kubelet server" May 10 00:36:35.377352 kubelet[1444]: I0510 00:36:35.377280 1444 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:36:35.377586 kubelet[1444]: I0510 00:36:35.377561 1444 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:36:35.379973 kubelet[1444]: E0510 00:36:35.379947 1444 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:36:35.381000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:35.381000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:35.381000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d02750 a1=c0000234b8 a2=c000d02720 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:35.381000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:35.381000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:35.381000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005139a0 a1=c0000234d0 a2=c000d027e0 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:35.383057 kubelet[1444]: I0510 00:36:35.382693 1444 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:36:35.383057 kubelet[1444]: I0510 00:36:35.382735 1444 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:36:35.383057 kubelet[1444]: I0510 00:36:35.382828 1444 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:36:35.383057 kubelet[1444]: I0510 00:36:35.382853 1444 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:36:35.383223 kubelet[1444]: I0510 00:36:35.383204 1444 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:36:35.383628 kubelet[1444]: E0510 00:36:35.383572 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.383932 kubelet[1444]: I0510 00:36:35.383918 1444 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:36:35.384119 kubelet[1444]: I0510 00:36:35.384106 1444 reconciler.go:26] "Reconciler: start to sync state" May 10 00:36:35.384204 kubelet[1444]: I0510 00:36:35.384175 1444 factory.go:221] Registration of the systemd container factory successfully May 10 00:36:35.384784 kubelet[1444]: I0510 00:36:35.384750 1444 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:36:35.393619 kubelet[1444]: I0510 00:36:35.393566 1444 factory.go:221] Registration of the containerd container factory successfully May 10 00:36:35.393810 kubelet[1444]: W0510 00:36:35.393785 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 10 00:36:35.394374 kubelet[1444]: E0510 00:36:35.394349 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 10 00:36:35.395308 kubelet[1444]: E0510 00:36:35.393724 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.27.183e035b1f884b44 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.37226426 +0000 UTC m=+0.523713568,LastTimestamp:2025-05-10 00:36:35.37226426 +0000 UTC m=+0.523713568,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:35.395855 kubelet[1444]: E0510 00:36:35.395818 1444 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.27\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 10 00:36:35.402260 kubelet[1444]: E0510 00:36:35.402158 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.27.183e035b1ffd2975 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.379923317 +0000 UTC m=+0.531372625,LastTimestamp:2025-05-10 00:36:35.379923317 +0000 UTC m=+0.531372625,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:35.405270 kubelet[1444]: I0510 00:36:35.405218 1444 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:36:35.405270 kubelet[1444]: I0510 00:36:35.405259 1444 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:36:35.405347 kubelet[1444]: I0510 00:36:35.405277 1444 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:35.411583 kubelet[1444]: E0510 00:36:35.411438 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.27.183e035b2172509b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.0.0.27 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.404378267 +0000 UTC m=+0.555827575,LastTimestamp:2025-05-10 00:36:35.404378267 +0000 UTC m=+0.555827575,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:35.415741 kubelet[1444]: E0510 00:36:35.415643 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.27.183e035b21726e1d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.27 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.404385821 +0000 UTC m=+0.555835129,LastTimestamp:2025-05-10 00:36:35.404385821 +0000 UTC m=+0.555835129,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:35.420729 kubelet[1444]: E0510 00:36:35.420590 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.27.183e035b21729450 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.0.0.27 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.4043956 +0000 UTC m=+0.555844898,LastTimestamp:2025-05-10 00:36:35.4043956 +0000 UTC m=+0.555844898,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:35.426000 audit[1461]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:35.426000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0fab0be0 a2=0 a3=7ffc0fab0bcc items=0 ppid=1444 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:36:35.427000 audit[1466]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:35.427000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffee3b39b70 a2=0 a3=7ffee3b39b5c items=0 ppid=1444 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:36:35.484821 kubelet[1444]: E0510 00:36:35.484717 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.585641 kubelet[1444]: E0510 00:36:35.585434 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.605980 kubelet[1444]: E0510 00:36:35.605879 1444 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.27\" not found" node="10.0.0.27" May 10 00:36:35.686547 kubelet[1444]: E0510 00:36:35.686476 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.787587 kubelet[1444]: E0510 00:36:35.787521 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.888632 kubelet[1444]: E0510 00:36:35.888508 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.989378 kubelet[1444]: E0510 00:36:35.989299 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:35.430000 audit[1468]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:35.430000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc4c0e230 a2=0 a3=7fffc4c0e21c items=0 ppid=1444 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:35.993000 audit[1473]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:35.993000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe9e6319c0 a2=0 a3=7ffe9e6319ac items=0 ppid=1444 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:35.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:35.995167 kubelet[1444]: I0510 00:36:35.995128 1444 policy_none.go:49] "None policy: Start" May 10 00:36:35.995167 kubelet[1444]: I0510 00:36:35.995171 1444 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:36:35.995341 kubelet[1444]: I0510 00:36:35.995185 1444 state_mem.go:35] "Initializing new in-memory state store" May 10 00:36:36.020677 systemd[1]: Created slice kubepods.slice. May 10 00:36:36.025562 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:36:36.028374 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:36:36.036389 kubelet[1444]: I0510 00:36:36.036347 1444 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:36:36.035000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:36.035000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:36.035000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000272f30 a1=c000dd1cb0 a2=c000272f00 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:36.036816 kubelet[1444]: I0510 00:36:36.036451 1444 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:36:36.036816 kubelet[1444]: I0510 00:36:36.036635 1444 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:36:36.036816 kubelet[1444]: I0510 00:36:36.036653 1444 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:36:36.037365 kubelet[1444]: I0510 00:36:36.037162 1444 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:36:36.038726 kubelet[1444]: E0510 00:36:36.038680 1444 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:36:36.038864 kubelet[1444]: E0510 00:36:36.038741 1444 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.27\" not found" May 10 00:36:36.047000 audit[1478]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:36.047000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff91b4c8b0 a2=0 a3=7fff91b4c89c items=0 ppid=1444 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:36:36.048834 kubelet[1444]: I0510 00:36:36.048791 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:36:36.048000 audit[1479]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:36.048000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffced3cd230 a2=0 a3=7ffced3cd21c items=0 ppid=1444 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:36:36.048000 audit[1480]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:36.048000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb8e5f320 a2=0 a3=7fffb8e5f30c items=0 ppid=1444 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:36:36.050436 kubelet[1444]: I0510 00:36:36.050122 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:36:36.050436 kubelet[1444]: I0510 00:36:36.050158 1444 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:36:36.050436 kubelet[1444]: I0510 00:36:36.050195 1444 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:36:36.050436 kubelet[1444]: I0510 00:36:36.050205 1444 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:36:36.050436 kubelet[1444]: E0510 00:36:36.050400 1444 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 00:36:36.049000 audit[1481]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:36.049000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff77185550 a2=0 a3=7fff7718553c items=0 ppid=1444 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:36:36.050000 audit[1482]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:36.050000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca991c610 a2=0 a3=7ffca991c5fc items=0 ppid=1444 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:36:36.050000 audit[1483]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:36.050000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff45000ad0 a2=0 a3=7fff45000abc items=0 ppid=1444 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:36:36.051000 audit[1484]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:36.051000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd7f9e170 a2=0 a3=7fffd7f9e15c items=0 ppid=1444 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:36:36.051000 audit[1485]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:36.051000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeee8cd8a0 a2=0 a3=7ffeee8cd88c items=0 ppid=1444 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:36:36.138306 kubelet[1444]: I0510 00:36:36.138266 1444 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.27" May 10 00:36:36.192562 kubelet[1444]: I0510 00:36:36.192413 1444 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.27" May 10 00:36:36.192562 kubelet[1444]: E0510 00:36:36.192468 1444 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.0.0.27\": node \"10.0.0.27\" not found" May 10 00:36:36.205521 kubelet[1444]: E0510 00:36:36.205487 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:36.241415 kubelet[1444]: I0510 00:36:36.241353 1444 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 00:36:36.241836 kubelet[1444]: W0510 00:36:36.241781 1444 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:36:36.241969 kubelet[1444]: E0510 00:36:36.241782 1444 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.17:6443/api/v1/namespaces/default/events\": read tcp 10.0.0.27:38110->10.0.0.17:6443: use of closed network connection" event="&Event{ObjectMeta:{10.0.0.27.183e035b21726e1d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.27,UID:10.0.0.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.27 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.27,},FirstTimestamp:2025-05-10 00:36:35.404385821 +0000 UTC m=+0.555835129,LastTimestamp:2025-05-10 00:36:36.13821234 +0000 UTC m=+1.289661648,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.27,}" May 10 00:36:36.306541 kubelet[1444]: E0510 00:36:36.306461 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:36.347214 kubelet[1444]: E0510 00:36:36.347010 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:36.367341 sudo[1337]: pam_unix(sudo:session): session closed for user root May 10 00:36:36.366000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:36.366000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:36.368746 sshd[1334]: pam_unix(sshd:session): session closed for user core May 10 00:36:36.368000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.369000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.371718 systemd[1]: sshd@6-10.0.0.27:22-10.0.0.1:60074.service: Deactivated successfully. May 10 00:36:36.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.27:22-10.0.0.1:60074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:36.372706 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:36:36.372883 systemd[1]: session-7.scope: Consumed 1.078s CPU time. May 10 00:36:36.373713 systemd-logind[1198]: Session 7 logged out. Waiting for processes to exit. May 10 00:36:36.375135 systemd-logind[1198]: Removed session 7. May 10 00:36:36.407266 kubelet[1444]: E0510 00:36:36.407184 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:36.508323 kubelet[1444]: E0510 00:36:36.508268 1444 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.27\" not found" May 10 00:36:36.610059 kubelet[1444]: I0510 00:36:36.610017 1444 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 00:36:36.610377 env[1207]: time="2025-05-10T00:36:36.610331651Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:36:36.610739 kubelet[1444]: I0510 00:36:36.610570 1444 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 00:36:37.347113 kubelet[1444]: I0510 00:36:37.347052 1444 apiserver.go:52] "Watching apiserver" May 10 00:36:37.347524 kubelet[1444]: E0510 00:36:37.347185 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:37.350767 kubelet[1444]: E0510 00:36:37.350717 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:37.356006 systemd[1]: Created slice kubepods-besteffort-pod97242328_a712_4923_abc6_950837637613.slice. May 10 00:36:37.370739 systemd[1]: Created slice kubepods-besteffort-pod1c7ca939_a875_46c1_b85e_de4e4d3cd801.slice. May 10 00:36:37.384902 kubelet[1444]: I0510 00:36:37.384844 1444 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:36:37.397157 kubelet[1444]: I0510 00:36:37.397068 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7-varrun\") pod \"csi-node-driver-mlz45\" (UID: \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\") " pod="calico-system/csi-node-driver-mlz45" May 10 00:36:37.397157 kubelet[1444]: I0510 00:36:37.397139 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7-kubelet-dir\") pod \"csi-node-driver-mlz45\" (UID: \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\") " pod="calico-system/csi-node-driver-mlz45" May 10 00:36:37.397398 kubelet[1444]: I0510 00:36:37.397187 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7-socket-dir\") pod \"csi-node-driver-mlz45\" (UID: \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\") " pod="calico-system/csi-node-driver-mlz45" May 10 00:36:37.397398 kubelet[1444]: I0510 00:36:37.397209 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-lib-modules\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397398 kubelet[1444]: I0510 00:36:37.397234 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-xtables-lock\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397398 kubelet[1444]: I0510 00:36:37.397320 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m9c6k\" (UniqueName: \"kubernetes.io/projected/1c7ca939-a875-46c1-b85e-de4e4d3cd801-kube-api-access-m9c6k\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397398 kubelet[1444]: I0510 00:36:37.397391 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5ww6p\" (UniqueName: \"kubernetes.io/projected/77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7-kube-api-access-5ww6p\") pod \"csi-node-driver-mlz45\" (UID: \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\") " pod="calico-system/csi-node-driver-mlz45" May 10 00:36:37.397605 kubelet[1444]: I0510 00:36:37.397421 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/97242328-a712-4923-abc6-950837637613-lib-modules\") pod \"kube-proxy-wc6kx\" (UID: \"97242328-a712-4923-abc6-950837637613\") " pod="kube-system/kube-proxy-wc6kx" May 10 00:36:37.397605 kubelet[1444]: I0510 00:36:37.397458 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-28g52\" (UniqueName: \"kubernetes.io/projected/97242328-a712-4923-abc6-950837637613-kube-api-access-28g52\") pod \"kube-proxy-wc6kx\" (UID: \"97242328-a712-4923-abc6-950837637613\") " pod="kube-system/kube-proxy-wc6kx" May 10 00:36:37.397605 kubelet[1444]: I0510 00:36:37.397478 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-policysync\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397605 kubelet[1444]: I0510 00:36:37.397499 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c7ca939-a875-46c1-b85e-de4e4d3cd801-tigera-ca-bundle\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397605 kubelet[1444]: I0510 00:36:37.397523 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-cni-bin-dir\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397750 kubelet[1444]: I0510 00:36:37.397542 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/97242328-a712-4923-abc6-950837637613-xtables-lock\") pod \"kube-proxy-wc6kx\" (UID: \"97242328-a712-4923-abc6-950837637613\") " pod="kube-system/kube-proxy-wc6kx" May 10 00:36:37.397750 kubelet[1444]: I0510 00:36:37.397559 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1c7ca939-a875-46c1-b85e-de4e4d3cd801-node-certs\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397750 kubelet[1444]: I0510 00:36:37.397579 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7-registration-dir\") pod \"csi-node-driver-mlz45\" (UID: \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\") " pod="calico-system/csi-node-driver-mlz45" May 10 00:36:37.397750 kubelet[1444]: I0510 00:36:37.397642 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/97242328-a712-4923-abc6-950837637613-kube-proxy\") pod \"kube-proxy-wc6kx\" (UID: \"97242328-a712-4923-abc6-950837637613\") " pod="kube-system/kube-proxy-wc6kx" May 10 00:36:37.397750 kubelet[1444]: I0510 00:36:37.397712 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-var-run-calico\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397903 kubelet[1444]: I0510 00:36:37.397748 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-var-lib-calico\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397903 kubelet[1444]: I0510 00:36:37.397784 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-cni-net-dir\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397903 kubelet[1444]: I0510 00:36:37.397815 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-cni-log-dir\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.397903 kubelet[1444]: I0510 00:36:37.397870 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1c7ca939-a875-46c1-b85e-de4e4d3cd801-flexvol-driver-host\") pod \"calico-node-m59nq\" (UID: \"1c7ca939-a875-46c1-b85e-de4e4d3cd801\") " pod="calico-system/calico-node-m59nq" May 10 00:36:37.500190 kubelet[1444]: I0510 00:36:37.500126 1444 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:36:37.501151 kubelet[1444]: E0510 00:36:37.501112 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:37.501151 kubelet[1444]: W0510 00:36:37.501140 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:37.501283 kubelet[1444]: E0510 00:36:37.501165 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:37.504769 kubelet[1444]: E0510 00:36:37.504635 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:37.504769 kubelet[1444]: W0510 00:36:37.504657 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:37.504769 kubelet[1444]: E0510 00:36:37.504673 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.509535 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:37.513189 kubelet[1444]: W0510 00:36:37.509557 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.509572 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.510813 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:37.513189 kubelet[1444]: W0510 00:36:37.510823 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.510835 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.513078 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:37.513189 kubelet[1444]: W0510 00:36:37.513100 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:37.513189 kubelet[1444]: E0510 00:36:37.513128 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:37.668476 kubelet[1444]: E0510 00:36:37.668290 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:37.669307 env[1207]: time="2025-05-10T00:36:37.669184075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wc6kx,Uid:97242328-a712-4923-abc6-950837637613,Namespace:kube-system,Attempt:0,}" May 10 00:36:37.673853 kubelet[1444]: E0510 00:36:37.673798 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:37.674341 env[1207]: time="2025-05-10T00:36:37.674298969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m59nq,Uid:1c7ca939-a875-46c1-b85e-de4e4d3cd801,Namespace:calico-system,Attempt:0,}" May 10 00:36:38.347723 kubelet[1444]: E0510 00:36:38.347638 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:38.544095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2933867182.mount: Deactivated successfully. May 10 00:36:38.549413 env[1207]: time="2025-05-10T00:36:38.549361988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.551847 env[1207]: time="2025-05-10T00:36:38.551804880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.555680 env[1207]: time="2025-05-10T00:36:38.555644692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.557969 env[1207]: time="2025-05-10T00:36:38.557942151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.559646 env[1207]: time="2025-05-10T00:36:38.559601915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.560897 env[1207]: time="2025-05-10T00:36:38.560864142Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.562211 env[1207]: time="2025-05-10T00:36:38.562179369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.565962 env[1207]: time="2025-05-10T00:36:38.565923913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:38.585497 env[1207]: time="2025-05-10T00:36:38.584962694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:38.585497 env[1207]: time="2025-05-10T00:36:38.585037535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:38.585497 env[1207]: time="2025-05-10T00:36:38.585467551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:38.586300 env[1207]: time="2025-05-10T00:36:38.585838357Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93ac97d17459dca5fd0357baf2003eb14917cda50bb68b9b43ce53de155ce74f pid=1505 runtime=io.containerd.runc.v2 May 10 00:36:38.631022 env[1207]: time="2025-05-10T00:36:38.630625675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:38.631022 env[1207]: time="2025-05-10T00:36:38.630694674Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:38.631022 env[1207]: time="2025-05-10T00:36:38.630708591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:38.631499 env[1207]: time="2025-05-10T00:36:38.630944353Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f pid=1521 runtime=io.containerd.runc.v2 May 10 00:36:38.640032 systemd[1]: Started cri-containerd-93ac97d17459dca5fd0357baf2003eb14917cda50bb68b9b43ce53de155ce74f.scope. May 10 00:36:38.679191 systemd[1]: Started cri-containerd-dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f.scope. May 10 00:36:38.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.735000 audit: BPF prog-id=61 op=LOAD May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1505 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616339376431373435396463613566643033353762616632303033 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1505 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616339376431373435396463613566643033353762616632303033 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit: BPF prog-id=62 op=LOAD May 10 00:36:38.736000 audit[1515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000317ea0 items=0 ppid=1505 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616339376431373435396463613566643033353762616632303033 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit: BPF prog-id=63 op=LOAD May 10 00:36:38.736000 audit[1515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000317ee8 items=0 ppid=1505 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616339376431373435396463613566643033353762616632303033 May 10 00:36:38.736000 audit: BPF prog-id=63 op=UNLOAD May 10 00:36:38.736000 audit: BPF prog-id=62 op=UNLOAD May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { perfmon } for pid=1515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit[1515]: AVC avc: denied { bpf } for pid=1515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.736000 audit: BPF prog-id=64 op=LOAD May 10 00:36:38.736000 audit[1515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003722f8 items=0 ppid=1505 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616339376431373435396463613566643033353762616632303033 May 10 00:36:38.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.762000 audit: BPF prog-id=65 op=LOAD May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383763326165353465313132353232623632313664343536336136 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383763326165353465313132353232623632313664343536336136 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit: BPF prog-id=66 op=LOAD May 10 00:36:38.763000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221440 items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383763326165353465313132353232623632313664343536336136 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit: BPF prog-id=67 op=LOAD May 10 00:36:38.763000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221488 items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383763326165353465313132353232623632313664343536336136 May 10 00:36:38.763000 audit: BPF prog-id=67 op=UNLOAD May 10 00:36:38.763000 audit: BPF prog-id=66 op=UNLOAD May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:38.763000 audit: BPF prog-id=68 op=LOAD May 10 00:36:38.763000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221898 items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:38.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383763326165353465313132353232623632313664343536336136 May 10 00:36:38.780428 env[1207]: time="2025-05-10T00:36:38.780362849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wc6kx,Uid:97242328-a712-4923-abc6-950837637613,Namespace:kube-system,Attempt:0,} returns sandbox id \"93ac97d17459dca5fd0357baf2003eb14917cda50bb68b9b43ce53de155ce74f\"" May 10 00:36:38.782424 kubelet[1444]: E0510 00:36:38.781847 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:38.783580 env[1207]: time="2025-05-10T00:36:38.783549506Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 10 00:36:38.786673 env[1207]: time="2025-05-10T00:36:38.786613684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m59nq,Uid:1c7ca939-a875-46c1-b85e-de4e4d3cd801,Namespace:calico-system,Attempt:0,} returns sandbox id \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\"" May 10 00:36:38.787353 kubelet[1444]: E0510 00:36:38.787298 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:39.051463 kubelet[1444]: E0510 00:36:39.051374 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:39.348761 kubelet[1444]: E0510 00:36:39.348471 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:40.151755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1337163788.mount: Deactivated successfully. May 10 00:36:40.349559 kubelet[1444]: E0510 00:36:40.349512 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:41.051452 kubelet[1444]: E0510 00:36:41.051365 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:41.285163 env[1207]: time="2025-05-10T00:36:41.285042132Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:41.288035 env[1207]: time="2025-05-10T00:36:41.287991514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:41.289927 env[1207]: time="2025-05-10T00:36:41.289887991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:41.291375 env[1207]: time="2025-05-10T00:36:41.291331859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:41.292010 env[1207]: time="2025-05-10T00:36:41.291966179Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 10 00:36:41.293558 env[1207]: time="2025-05-10T00:36:41.293509835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:36:41.294790 env[1207]: time="2025-05-10T00:36:41.294756232Z" level=info msg="CreateContainer within sandbox \"93ac97d17459dca5fd0357baf2003eb14917cda50bb68b9b43ce53de155ce74f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:36:41.313787 env[1207]: time="2025-05-10T00:36:41.313658227Z" level=info msg="CreateContainer within sandbox \"93ac97d17459dca5fd0357baf2003eb14917cda50bb68b9b43ce53de155ce74f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8b69235580ee92664e9f934cf334d30aa9ec1d8fa148f62d84d4d9463bbd5fe1\"" May 10 00:36:41.314557 env[1207]: time="2025-05-10T00:36:41.314477674Z" level=info msg="StartContainer for \"8b69235580ee92664e9f934cf334d30aa9ec1d8fa148f62d84d4d9463bbd5fe1\"" May 10 00:36:41.347119 systemd[1]: Started cri-containerd-8b69235580ee92664e9f934cf334d30aa9ec1d8fa148f62d84d4d9463bbd5fe1.scope. May 10 00:36:41.349648 kubelet[1444]: E0510 00:36:41.349624 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.380789 kernel: kauditd_printk_skb: 334 callbacks suppressed May 10 00:36:41.380841 kernel: audit: type=1400 audit(1746837401.378:447): avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7ad5e92d58 items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.389182 kernel: audit: type=1300 audit(1746837401.378:447): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7ad5e92d58 items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.389259 kernel: audit: type=1327 audit(1746837401.378:447): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363932333535383065653932363634653966393334636633333464 May 10 00:36:41.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363932333535383065653932363634653966393334636633333464 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.397594 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.397655 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.404301 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.404510 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.411078 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.411189 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.416539 env[1207]: time="2025-05-10T00:36:41.416483398Z" level=info msg="StartContainer for \"8b69235580ee92664e9f934cf334d30aa9ec1d8fa148f62d84d4d9463bbd5fe1\" returns successfully" May 10 00:36:41.418553 kernel: audit: type=1400 audit(1746837401.378:448): avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.378000 audit: BPF prog-id=69 op=LOAD May 10 00:36:41.378000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363932333535383065653932363634653966393334636633333464 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.383000 audit: BPF prog-id=70 op=LOAD May 10 00:36:41.383000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363932333535383065653932363634653966393334636633333464 May 10 00:36:41.388000 audit: BPF prog-id=70 op=UNLOAD May 10 00:36:41.388000 audit: BPF prog-id=69 op=UNLOAD May 10 00:36:41.388000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.388000 audit: BPF prog-id=71 op=LOAD May 10 00:36:41.388000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363932333535383065653932363634653966393334636633333464 May 10 00:36:41.554000 audit[1646]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.554000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7418cf80 a2=0 a3=7ffc7418cf6c items=0 ppid=1597 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:36:41.554000 audit[1647]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.554000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a768560 a2=0 a3=7ffe3a76854c items=0 ppid=1597 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:36:41.555000 audit[1648]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.555000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca57c3340 a2=0 a3=7ffca57c332c items=0 ppid=1597 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:36:41.556000 audit[1650]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.556000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd83a19880 a2=0 a3=7ffd83a1986c items=0 ppid=1597 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:36:41.556000 audit[1651]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.556000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee0dc1470 a2=0 a3=7ffee0dc145c items=0 ppid=1597 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:36:41.558000 audit[1652]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.558000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6212adc0 a2=0 a3=7fff6212adac items=0 ppid=1597 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:36:41.657000 audit[1653]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.657000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0e6999d0 a2=0 a3=7ffc0e6999bc items=0 ppid=1597 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:36:41.660000 audit[1655]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.660000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffffa7ed760 a2=0 a3=7ffffa7ed74c items=0 ppid=1597 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:36:41.663000 audit[1658]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.663000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe436ff680 a2=0 a3=7ffe436ff66c items=0 ppid=1597 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:36:41.664000 audit[1659]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.664000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe0093610 a2=0 a3=7fffe00935fc items=0 ppid=1597 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:36:41.666000 audit[1661]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.666000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4fe3a680 a2=0 a3=7fff4fe3a66c items=0 ppid=1597 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:36:41.667000 audit[1662]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.667000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd542ed2d0 a2=0 a3=7ffd542ed2bc items=0 ppid=1597 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:36:41.669000 audit[1664]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.669000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe63f4d540 a2=0 a3=7ffe63f4d52c items=0 ppid=1597 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:36:41.672000 audit[1667]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.672000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc1ce3700 a2=0 a3=7ffcc1ce36ec items=0 ppid=1597 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:36:41.673000 audit[1668]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.673000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27e8b1a0 a2=0 a3=7fff27e8b18c items=0 ppid=1597 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:36:41.676000 audit[1670]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.676000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1fa9d840 a2=0 a3=7ffd1fa9d82c items=0 ppid=1597 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:36:41.677000 audit[1671]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.677000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc6b17730 a2=0 a3=7fffc6b1771c items=0 ppid=1597 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:36:41.679000 audit[1673]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.679000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6c584490 a2=0 a3=7ffd6c58447c items=0 ppid=1597 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:41.682000 audit[1676]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.682000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8bc5d620 a2=0 a3=7ffe8bc5d60c items=0 ppid=1597 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:41.685000 audit[1679]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.685000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6b621200 a2=0 a3=7fff6b6211ec items=0 ppid=1597 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:36:41.686000 audit[1680]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.686000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc46114ce0 a2=0 a3=7ffc46114ccc items=0 ppid=1597 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:36:41.688000 audit[1682]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.688000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe9bfaccd0 a2=0 a3=7ffe9bfaccbc items=0 ppid=1597 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:41.708000 audit[1686]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.708000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffecf352af0 a2=0 a3=7ffecf352adc items=0 ppid=1597 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:41.709000 audit[1687]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.709000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0bdd8310 a2=0 a3=7ffe0bdd82fc items=0 ppid=1597 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:36:41.711000 audit[1689]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:41.711000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff12b95ac0 a2=0 a3=7fff12b95aac items=0 ppid=1597 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:36:41.732000 audit[1695]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:41.732000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf7cc3750 a2=0 a3=7ffcf7cc373c items=0 ppid=1597 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:41.749000 audit[1695]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:41.749000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffcf7cc3750 a2=0 a3=7ffcf7cc373c items=0 ppid=1597 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:41.751000 audit[1702]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.751000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed7c20e20 a2=0 a3=7ffed7c20e0c items=0 ppid=1597 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:36:41.754000 audit[1704]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.754000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7da7d470 a2=0 a3=7ffd7da7d45c items=0 ppid=1597 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:36:41.758000 audit[1707]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.758000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca2ed9dd0 a2=0 a3=7ffca2ed9dbc items=0 ppid=1597 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:36:41.759000 audit[1708]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.759000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8a5ebc70 a2=0 a3=7ffe8a5ebc5c items=0 ppid=1597 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:36:41.761000 audit[1710]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.761000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe55b9f880 a2=0 a3=7ffe55b9f86c items=0 ppid=1597 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:36:41.763000 audit[1711]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.763000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0a97ca20 a2=0 a3=7ffd0a97ca0c items=0 ppid=1597 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:36:41.765000 audit[1713]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.765000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe14d8a880 a2=0 a3=7ffe14d8a86c items=0 ppid=1597 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:36:41.768000 audit[1716]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.768000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc89f07ed0 a2=0 a3=7ffc89f07ebc items=0 ppid=1597 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:36:41.769000 audit[1717]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.769000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc26a5f700 a2=0 a3=7ffc26a5f6ec items=0 ppid=1597 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:36:41.772000 audit[1719]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.772000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda62b4350 a2=0 a3=7ffda62b433c items=0 ppid=1597 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:36:41.773000 audit[1720]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.773000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc53cb4900 a2=0 a3=7ffc53cb48ec items=0 ppid=1597 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:36:41.775000 audit[1722]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.775000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5a2abb70 a2=0 a3=7ffe5a2abb5c items=0 ppid=1597 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:41.778000 audit[1725]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.778000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde44ad760 a2=0 a3=7ffde44ad74c items=0 ppid=1597 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:36:41.781000 audit[1728]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.781000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed33fc830 a2=0 a3=7ffed33fc81c items=0 ppid=1597 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:36:41.782000 audit[1729]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.782000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2ea5c780 a2=0 a3=7ffd2ea5c76c items=0 ppid=1597 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:36:41.784000 audit[1731]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.784000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe064047d0 a2=0 a3=7ffe064047bc items=0 ppid=1597 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:41.787000 audit[1734]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.787000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd041bd3c0 a2=0 a3=7ffd041bd3ac items=0 ppid=1597 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:41.788000 audit[1735]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.788000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd22ccef20 a2=0 a3=7ffd22ccef0c items=0 ppid=1597 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:36:41.790000 audit[1737]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.790000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe21533220 a2=0 a3=7ffe2153320c items=0 ppid=1597 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:36:41.791000 audit[1738]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.791000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf7eac1a0 a2=0 a3=7ffcf7eac18c items=0 ppid=1597 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:36:41.793000 audit[1740]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.793000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe80136400 a2=0 a3=7ffe801363ec items=0 ppid=1597 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:41.799000 audit[1743]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:41.799000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6d8a5b10 a2=0 a3=7fff6d8a5afc items=0 ppid=1597 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:41.802000 audit[1745]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:36:41.802000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff58ed6ee0 a2=0 a3=7fff58ed6ecc items=0 ppid=1597 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.802000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:41.826000 audit[1745]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:36:41.826000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff58ed6ee0 a2=0 a3=7fff58ed6ecc items=0 ppid=1597 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.826000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:42.067882 kubelet[1444]: E0510 00:36:42.067830 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:42.076377 kubelet[1444]: I0510 00:36:42.076312 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wc6kx" podStartSLOduration=3.566199935 podStartE2EDuration="6.076295176s" podCreationTimestamp="2025-05-10 00:36:36 +0000 UTC" firstStartedPulling="2025-05-10 00:36:38.78302897 +0000 UTC m=+3.934478278" lastFinishedPulling="2025-05-10 00:36:41.293124211 +0000 UTC m=+6.444573519" observedRunningTime="2025-05-10 00:36:42.076032353 +0000 UTC m=+7.227481661" watchObservedRunningTime="2025-05-10 00:36:42.076295176 +0000 UTC m=+7.227744494" May 10 00:36:42.115615 kubelet[1444]: E0510 00:36:42.115582 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.115615 kubelet[1444]: W0510 00:36:42.115607 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.115765 kubelet[1444]: E0510 00:36:42.115629 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.115836 kubelet[1444]: E0510 00:36:42.115819 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.115836 kubelet[1444]: W0510 00:36:42.115829 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.115836 kubelet[1444]: E0510 00:36:42.115836 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.115989 kubelet[1444]: E0510 00:36:42.115974 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.115989 kubelet[1444]: W0510 00:36:42.115985 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116035 kubelet[1444]: E0510 00:36:42.115991 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.116180 kubelet[1444]: E0510 00:36:42.116167 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.116180 kubelet[1444]: W0510 00:36:42.116175 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116180 kubelet[1444]: E0510 00:36:42.116182 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.116364 kubelet[1444]: E0510 00:36:42.116346 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.116364 kubelet[1444]: W0510 00:36:42.116362 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116436 kubelet[1444]: E0510 00:36:42.116373 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.116570 kubelet[1444]: E0510 00:36:42.116551 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.116570 kubelet[1444]: W0510 00:36:42.116563 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116631 kubelet[1444]: E0510 00:36:42.116570 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.116745 kubelet[1444]: E0510 00:36:42.116732 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.116770 kubelet[1444]: W0510 00:36:42.116746 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116770 kubelet[1444]: E0510 00:36:42.116758 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.116915 kubelet[1444]: E0510 00:36:42.116902 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.116915 kubelet[1444]: W0510 00:36:42.116911 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.116988 kubelet[1444]: E0510 00:36:42.116919 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117070 kubelet[1444]: E0510 00:36:42.117054 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117070 kubelet[1444]: W0510 00:36:42.117064 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.117070 kubelet[1444]: E0510 00:36:42.117071 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117266 kubelet[1444]: E0510 00:36:42.117253 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117293 kubelet[1444]: W0510 00:36:42.117267 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.117293 kubelet[1444]: E0510 00:36:42.117277 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117439 kubelet[1444]: E0510 00:36:42.117424 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117439 kubelet[1444]: W0510 00:36:42.117436 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.117508 kubelet[1444]: E0510 00:36:42.117445 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117590 kubelet[1444]: E0510 00:36:42.117575 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117590 kubelet[1444]: W0510 00:36:42.117588 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.117679 kubelet[1444]: E0510 00:36:42.117600 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117804 kubelet[1444]: E0510 00:36:42.117791 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117829 kubelet[1444]: W0510 00:36:42.117803 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.117829 kubelet[1444]: E0510 00:36:42.117812 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.117972 kubelet[1444]: E0510 00:36:42.117958 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.117972 kubelet[1444]: W0510 00:36:42.117969 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118044 kubelet[1444]: E0510 00:36:42.117978 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118151 kubelet[1444]: E0510 00:36:42.118137 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118151 kubelet[1444]: W0510 00:36:42.118148 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118219 kubelet[1444]: E0510 00:36:42.118157 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118312 kubelet[1444]: E0510 00:36:42.118298 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118312 kubelet[1444]: W0510 00:36:42.118310 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118394 kubelet[1444]: E0510 00:36:42.118326 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118505 kubelet[1444]: E0510 00:36:42.118492 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118529 kubelet[1444]: W0510 00:36:42.118504 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118529 kubelet[1444]: E0510 00:36:42.118513 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118657 kubelet[1444]: E0510 00:36:42.118644 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118657 kubelet[1444]: W0510 00:36:42.118653 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118657 kubelet[1444]: E0510 00:36:42.118660 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118785 kubelet[1444]: E0510 00:36:42.118774 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118785 kubelet[1444]: W0510 00:36:42.118783 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118829 kubelet[1444]: E0510 00:36:42.118790 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.118955 kubelet[1444]: E0510 00:36:42.118944 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.118981 kubelet[1444]: W0510 00:36:42.118955 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.118981 kubelet[1444]: E0510 00:36:42.118962 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.151438 kubelet[1444]: E0510 00:36:42.151402 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.151438 kubelet[1444]: W0510 00:36:42.151422 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.151438 kubelet[1444]: E0510 00:36:42.151436 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.151649 kubelet[1444]: E0510 00:36:42.151626 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.151649 kubelet[1444]: W0510 00:36:42.151639 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.151728 kubelet[1444]: E0510 00:36:42.151655 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.151875 kubelet[1444]: E0510 00:36:42.151859 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.151875 kubelet[1444]: W0510 00:36:42.151873 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.151941 kubelet[1444]: E0510 00:36:42.151887 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.152090 kubelet[1444]: E0510 00:36:42.152058 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.152090 kubelet[1444]: W0510 00:36:42.152070 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.152090 kubelet[1444]: E0510 00:36:42.152083 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.152264 kubelet[1444]: E0510 00:36:42.152233 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.152264 kubelet[1444]: W0510 00:36:42.152263 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.152366 kubelet[1444]: E0510 00:36:42.152277 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.152524 kubelet[1444]: E0510 00:36:42.152509 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.152524 kubelet[1444]: W0510 00:36:42.152522 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.152636 kubelet[1444]: E0510 00:36:42.152547 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.152799 kubelet[1444]: E0510 00:36:42.152784 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.152799 kubelet[1444]: W0510 00:36:42.152796 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.152877 kubelet[1444]: E0510 00:36:42.152810 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.152972 kubelet[1444]: E0510 00:36:42.152961 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.152972 kubelet[1444]: W0510 00:36:42.152969 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.153038 kubelet[1444]: E0510 00:36:42.152980 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.153122 kubelet[1444]: E0510 00:36:42.153111 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.153122 kubelet[1444]: W0510 00:36:42.153120 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.153177 kubelet[1444]: E0510 00:36:42.153130 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.153308 kubelet[1444]: E0510 00:36:42.153298 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.153308 kubelet[1444]: W0510 00:36:42.153306 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.153386 kubelet[1444]: E0510 00:36:42.153323 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.153560 kubelet[1444]: E0510 00:36:42.153543 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.153560 kubelet[1444]: W0510 00:36:42.153558 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.153637 kubelet[1444]: E0510 00:36:42.153573 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.153754 kubelet[1444]: E0510 00:36:42.153740 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:42.153786 kubelet[1444]: W0510 00:36:42.153754 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:42.153786 kubelet[1444]: E0510 00:36:42.153764 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:42.350055 kubelet[1444]: E0510 00:36:42.349842 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:42.891677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1413283339.mount: Deactivated successfully. May 10 00:36:43.051913 kubelet[1444]: E0510 00:36:43.051409 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:43.069640 kubelet[1444]: E0510 00:36:43.069578 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:43.126380 kubelet[1444]: E0510 00:36:43.126330 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.126380 kubelet[1444]: W0510 00:36:43.126366 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.126380 kubelet[1444]: E0510 00:36:43.126390 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.126688 kubelet[1444]: E0510 00:36:43.126652 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.126734 kubelet[1444]: W0510 00:36:43.126686 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.126734 kubelet[1444]: E0510 00:36:43.126716 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.126947 kubelet[1444]: E0510 00:36:43.126934 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.126947 kubelet[1444]: W0510 00:36:43.126944 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127017 kubelet[1444]: E0510 00:36:43.126952 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127121 kubelet[1444]: E0510 00:36:43.127108 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127121 kubelet[1444]: W0510 00:36:43.127118 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127174 kubelet[1444]: E0510 00:36:43.127125 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127340 kubelet[1444]: E0510 00:36:43.127324 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127340 kubelet[1444]: W0510 00:36:43.127335 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127340 kubelet[1444]: E0510 00:36:43.127343 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127508 kubelet[1444]: E0510 00:36:43.127494 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127508 kubelet[1444]: W0510 00:36:43.127504 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127508 kubelet[1444]: E0510 00:36:43.127510 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127691 kubelet[1444]: E0510 00:36:43.127677 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127691 kubelet[1444]: W0510 00:36:43.127688 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127736 kubelet[1444]: E0510 00:36:43.127695 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127840 kubelet[1444]: E0510 00:36:43.127829 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127840 kubelet[1444]: W0510 00:36:43.127839 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127889 kubelet[1444]: E0510 00:36:43.127846 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.127996 kubelet[1444]: E0510 00:36:43.127980 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.127996 kubelet[1444]: W0510 00:36:43.127989 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.127996 kubelet[1444]: E0510 00:36:43.127995 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.128136 kubelet[1444]: E0510 00:36:43.128121 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.128136 kubelet[1444]: W0510 00:36:43.128131 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.128136 kubelet[1444]: E0510 00:36:43.128140 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.128333 kubelet[1444]: E0510 00:36:43.128310 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.128333 kubelet[1444]: W0510 00:36:43.128330 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.128386 kubelet[1444]: E0510 00:36:43.128341 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.128503 kubelet[1444]: E0510 00:36:43.128488 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.128503 kubelet[1444]: W0510 00:36:43.128499 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.128503 kubelet[1444]: E0510 00:36:43.128505 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.128690 kubelet[1444]: E0510 00:36:43.128676 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.128690 kubelet[1444]: W0510 00:36:43.128690 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.128771 kubelet[1444]: E0510 00:36:43.128701 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.128879 kubelet[1444]: E0510 00:36:43.128868 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.128879 kubelet[1444]: W0510 00:36:43.128877 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.128967 kubelet[1444]: E0510 00:36:43.128886 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129041 kubelet[1444]: E0510 00:36:43.129030 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129068 kubelet[1444]: W0510 00:36:43.129040 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129068 kubelet[1444]: E0510 00:36:43.129049 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129223 kubelet[1444]: E0510 00:36:43.129208 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129223 kubelet[1444]: W0510 00:36:43.129217 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129284 kubelet[1444]: E0510 00:36:43.129224 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129406 kubelet[1444]: E0510 00:36:43.129395 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129406 kubelet[1444]: W0510 00:36:43.129404 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129477 kubelet[1444]: E0510 00:36:43.129411 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129561 kubelet[1444]: E0510 00:36:43.129548 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129561 kubelet[1444]: W0510 00:36:43.129557 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129561 kubelet[1444]: E0510 00:36:43.129563 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129701 kubelet[1444]: E0510 00:36:43.129691 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129701 kubelet[1444]: W0510 00:36:43.129699 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129747 kubelet[1444]: E0510 00:36:43.129706 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.129840 kubelet[1444]: E0510 00:36:43.129832 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.129872 kubelet[1444]: W0510 00:36:43.129840 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.129872 kubelet[1444]: E0510 00:36:43.129846 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.158349 kubelet[1444]: E0510 00:36:43.158253 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.158349 kubelet[1444]: W0510 00:36:43.158270 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.158349 kubelet[1444]: E0510 00:36:43.158282 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.158491 kubelet[1444]: E0510 00:36:43.158476 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.158491 kubelet[1444]: W0510 00:36:43.158487 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.158835 kubelet[1444]: E0510 00:36:43.158495 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.158835 kubelet[1444]: E0510 00:36:43.158623 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.158835 kubelet[1444]: W0510 00:36:43.158630 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.158835 kubelet[1444]: E0510 00:36:43.158636 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.158835 kubelet[1444]: E0510 00:36:43.158746 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.158835 kubelet[1444]: W0510 00:36:43.158752 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.158835 kubelet[1444]: E0510 00:36:43.158758 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.159211 kubelet[1444]: E0510 00:36:43.158942 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.159211 kubelet[1444]: W0510 00:36:43.158950 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.159211 kubelet[1444]: E0510 00:36:43.158959 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.159331 kubelet[1444]: E0510 00:36:43.159248 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.159331 kubelet[1444]: W0510 00:36:43.159258 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.159331 kubelet[1444]: E0510 00:36:43.159266 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.159717 kubelet[1444]: E0510 00:36:43.159700 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.159717 kubelet[1444]: W0510 00:36:43.159714 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.159791 kubelet[1444]: E0510 00:36:43.159722 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.159900 kubelet[1444]: E0510 00:36:43.159873 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.159962 kubelet[1444]: W0510 00:36:43.159903 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.159962 kubelet[1444]: E0510 00:36:43.159915 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.160092 kubelet[1444]: E0510 00:36:43.160073 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.160092 kubelet[1444]: W0510 00:36:43.160088 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.160176 kubelet[1444]: E0510 00:36:43.160098 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.160229 kubelet[1444]: E0510 00:36:43.160217 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.160229 kubelet[1444]: W0510 00:36:43.160228 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.160335 kubelet[1444]: E0510 00:36:43.160248 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.160490 kubelet[1444]: E0510 00:36:43.160470 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.160490 kubelet[1444]: W0510 00:36:43.160486 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.160546 kubelet[1444]: E0510 00:36:43.160499 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.160839 kubelet[1444]: E0510 00:36:43.160824 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:43.160839 kubelet[1444]: W0510 00:36:43.160834 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:43.160912 kubelet[1444]: E0510 00:36:43.160842 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:43.350423 kubelet[1444]: E0510 00:36:43.350376 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:43.466778 env[1207]: time="2025-05-10T00:36:43.466744872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:43.511106 env[1207]: time="2025-05-10T00:36:43.511065495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:43.556701 env[1207]: time="2025-05-10T00:36:43.556633067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:43.575137 env[1207]: time="2025-05-10T00:36:43.575097561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:43.575673 env[1207]: time="2025-05-10T00:36:43.575641722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:36:43.577849 env[1207]: time="2025-05-10T00:36:43.577811552Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:36:43.861913 env[1207]: time="2025-05-10T00:36:43.861766189Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded\"" May 10 00:36:43.862340 env[1207]: time="2025-05-10T00:36:43.862301624Z" level=info msg="StartContainer for \"8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded\"" May 10 00:36:43.881460 systemd[1]: Started cri-containerd-8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded.scope. May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff790617ac8 items=0 ppid=1521 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373533663765646235666234333834303361313965333735306563 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.896000 audit: BPF prog-id=72 op=LOAD May 10 00:36:43.896000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d3ba8 items=0 ppid=1521 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373533663765646235666234333834303361313965333735306563 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit: BPF prog-id=73 op=LOAD May 10 00:36:43.897000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d3bf8 items=0 ppid=1521 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373533663765646235666234333834303361313965333735306563 May 10 00:36:43.897000 audit: BPF prog-id=73 op=UNLOAD May 10 00:36:43.897000 audit: BPF prog-id=72 op=UNLOAD May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.897000 audit: BPF prog-id=74 op=LOAD May 10 00:36:43.897000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d3c88 items=0 ppid=1521 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373533663765646235666234333834303361313965333735306563 May 10 00:36:43.923438 systemd[1]: cri-containerd-8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded.scope: Deactivated successfully. May 10 00:36:43.927000 audit: BPF prog-id=74 op=UNLOAD May 10 00:36:43.973451 env[1207]: time="2025-05-10T00:36:43.973406154Z" level=info msg="StartContainer for \"8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded\" returns successfully" May 10 00:36:43.988343 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded-rootfs.mount: Deactivated successfully. May 10 00:36:44.071706 kubelet[1444]: E0510 00:36:44.071674 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:44.350870 kubelet[1444]: E0510 00:36:44.350748 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:44.386493 env[1207]: time="2025-05-10T00:36:44.386441180Z" level=info msg="shim disconnected" id=8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded May 10 00:36:44.386493 env[1207]: time="2025-05-10T00:36:44.386486154Z" level=warning msg="cleaning up after shim disconnected" id=8e753f7edb5fb438403a19e3750ecd631d90c981b865b12b0f1e482d08645ded namespace=k8s.io May 10 00:36:44.386493 env[1207]: time="2025-05-10T00:36:44.386496564Z" level=info msg="cleaning up dead shim" May 10 00:36:44.392970 env[1207]: time="2025-05-10T00:36:44.392922747Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:36:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1860 runtime=io.containerd.runc.v2\n" May 10 00:36:45.050977 kubelet[1444]: E0510 00:36:45.050887 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:45.073812 kubelet[1444]: E0510 00:36:45.073774 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:45.074517 env[1207]: time="2025-05-10T00:36:45.074475415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:36:45.351930 kubelet[1444]: E0510 00:36:45.351762 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:46.200000 audit[1873]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.200000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffbe1fa960 a2=0 a3=7fffbe1fa94c items=0 ppid=1597 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.206000 audit[1873]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.206000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffbe1fa960 a2=0 a3=0 items=0 ppid=1597 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.224000 audit[1877]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.224000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc0901f170 a2=0 a3=7ffc0901f15c items=0 ppid=1597 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.230000 audit[1877]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.230000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0901f170 a2=0 a3=7ffc0901f15c items=0 ppid=1597 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.352997 kubelet[1444]: E0510 00:36:46.352915 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:47.051292 kubelet[1444]: E0510 00:36:47.051174 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:47.205000 audit[1879]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.209024 kernel: kauditd_printk_skb: 242 callbacks suppressed May 10 00:36:47.209093 kernel: audit: type=1325 audit(1746837407.205:515): table=filter:69 family=2 entries=10 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.205000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffebf1b0e60 a2=0 a3=7ffebf1b0e4c items=0 ppid=1597 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.218778 kernel: audit: type=1300 audit(1746837407.205:515): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffebf1b0e60 a2=0 a3=7ffebf1b0e4c items=0 ppid=1597 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.218863 kernel: audit: type=1327 audit(1746837407.205:515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.247000 audit[1879]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.247000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffebf1b0e60 a2=0 a3=7ffebf1b0e4c items=0 ppid=1597 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.258153 kernel: audit: type=1325 audit(1746837407.247:516): table=nat:70 family=2 entries=44 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.258294 kernel: audit: type=1300 audit(1746837407.247:516): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffebf1b0e60 a2=0 a3=7ffebf1b0e4c items=0 ppid=1597 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.262257 kernel: audit: type=1327 audit(1746837407.247:516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.354076 kubelet[1444]: E0510 00:36:47.353584 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:48.262000 audit[1881]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.262000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd6a882550 a2=0 a3=7ffd6a88253c items=0 ppid=1597 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:48.274227 kernel: audit: type=1325 audit(1746837408.262:517): table=filter:71 family=2 entries=10 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.274306 kernel: audit: type=1300 audit(1746837408.262:517): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd6a882550 a2=0 a3=7ffd6a88253c items=0 ppid=1597 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:48.274346 kernel: audit: type=1327 audit(1746837408.262:517): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:48.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:48.287000 audit[1881]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.291260 kernel: audit: type=1325 audit(1746837408.287:518): table=nat:72 family=2 entries=56 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.287000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd6a882550 a2=0 a3=7ffd6a88253c items=0 ppid=1597 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:48.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:48.353955 kubelet[1444]: E0510 00:36:48.353829 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:49.050692 kubelet[1444]: E0510 00:36:49.050612 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:49.355061 kubelet[1444]: E0510 00:36:49.354883 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:50.356060 kubelet[1444]: E0510 00:36:50.355988 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:51.051456 kubelet[1444]: E0510 00:36:51.051351 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:51.356988 kubelet[1444]: E0510 00:36:51.356826 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:51.357463 env[1207]: time="2025-05-10T00:36:51.357082390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.359151 env[1207]: time="2025-05-10T00:36:51.359103201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.361144 env[1207]: time="2025-05-10T00:36:51.361100757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.364584 env[1207]: time="2025-05-10T00:36:51.364531262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.365054 env[1207]: time="2025-05-10T00:36:51.365017093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:36:51.367430 env[1207]: time="2025-05-10T00:36:51.367388201Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:36:51.384609 env[1207]: time="2025-05-10T00:36:51.384527319Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40\"" May 10 00:36:51.385192 env[1207]: time="2025-05-10T00:36:51.385125421Z" level=info msg="StartContainer for \"874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40\"" May 10 00:36:51.437533 systemd[1]: Started cri-containerd-874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40.scope. May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f80f84bd4d8 items=0 ppid=1521 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346262306266623163313762386135353562336266343036303439 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit: BPF prog-id=75 op=LOAD May 10 00:36:51.478000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000234498 items=0 ppid=1521 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346262306266623163313762386135353562336266343036303439 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit: BPF prog-id=76 op=LOAD May 10 00:36:51.478000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002344e8 items=0 ppid=1521 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346262306266623163313762386135353562336266343036303439 May 10 00:36:51.478000 audit: BPF prog-id=76 op=UNLOAD May 10 00:36:51.478000 audit: BPF prog-id=75 op=UNLOAD May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.478000 audit: BPF prog-id=77 op=LOAD May 10 00:36:51.478000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234578 items=0 ppid=1521 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837346262306266623163313762386135353562336266343036303439 May 10 00:36:51.502886 env[1207]: time="2025-05-10T00:36:51.502793302Z" level=info msg="StartContainer for \"874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40\" returns successfully" May 10 00:36:52.088659 kubelet[1444]: E0510 00:36:52.088608 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:52.357282 kubelet[1444]: E0510 00:36:52.357044 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:52.465000 audit[1920]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.467830 kernel: kauditd_printk_skb: 45 callbacks suppressed May 10 00:36:52.467950 kernel: audit: type=1325 audit(1746837412.465:525): table=filter:73 family=2 entries=10 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.465000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdf0c20de0 a2=0 a3=7ffdf0c20dcc items=0 ppid=1597 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.482295 kernel: audit: type=1300 audit(1746837412.465:525): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdf0c20de0 a2=0 a3=7ffdf0c20dcc items=0 ppid=1597 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.482474 kernel: audit: type=1327 audit(1746837412.465:525): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:52.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:52.721000 audit[1920]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.721000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf0c20de0 a2=0 a3=7ffdf0c20dcc items=0 ppid=1597 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.731123 kernel: audit: type=1325 audit(1746837412.721:526): table=nat:74 family=2 entries=20 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.731178 kernel: audit: type=1300 audit(1746837412.721:526): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf0c20de0 a2=0 a3=7ffdf0c20dcc items=0 ppid=1597 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.731226 kernel: audit: type=1327 audit(1746837412.721:526): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:52.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:53.051690 kubelet[1444]: E0510 00:36:53.051495 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:53.089756 kubelet[1444]: E0510 00:36:53.089694 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:53.357949 kubelet[1444]: E0510 00:36:53.357782 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:53.648680 env[1207]: time="2025-05-10T00:36:53.648525422Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:36:53.650405 systemd[1]: cri-containerd-874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40.scope: Deactivated successfully. May 10 00:36:53.650645 systemd[1]: cri-containerd-874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40.scope: Consumed 1.187s CPU time. May 10 00:36:53.655000 audit: BPF prog-id=77 op=UNLOAD May 10 00:36:53.658257 kernel: audit: type=1334 audit(1746837413.655:527): prog-id=77 op=UNLOAD May 10 00:36:53.668770 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40-rootfs.mount: Deactivated successfully. May 10 00:36:53.686783 kubelet[1444]: I0510 00:36:53.686724 1444 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 10 00:36:54.179424 env[1207]: time="2025-05-10T00:36:54.179371568Z" level=info msg="shim disconnected" id=874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40 May 10 00:36:54.179424 env[1207]: time="2025-05-10T00:36:54.179421121Z" level=warning msg="cleaning up after shim disconnected" id=874bb0bfb1c17b8a555b3bf40604948d66cb24160b3c08066542dffbed0bfc40 namespace=k8s.io May 10 00:36:54.179424 env[1207]: time="2025-05-10T00:36:54.179430669Z" level=info msg="cleaning up dead shim" May 10 00:36:54.239887 env[1207]: time="2025-05-10T00:36:54.239819421Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:36:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1935 runtime=io.containerd.runc.v2\n" May 10 00:36:54.358206 kubelet[1444]: E0510 00:36:54.358120 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:55.058585 systemd[1]: Created slice kubepods-besteffort-pod77a459ed_4cf8_4e21_9ce3_7ce517f0b2b7.slice. May 10 00:36:55.060896 env[1207]: time="2025-05-10T00:36:55.060847014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mlz45,Uid:77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7,Namespace:calico-system,Attempt:0,}" May 10 00:36:55.094984 kubelet[1444]: E0510 00:36:55.094433 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:55.096044 env[1207]: time="2025-05-10T00:36:55.095993940Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:36:55.124866 env[1207]: time="2025-05-10T00:36:55.124771839Z" level=error msg="Failed to destroy network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:55.125228 env[1207]: time="2025-05-10T00:36:55.125186557Z" level=error msg="encountered an error cleaning up failed sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:55.125309 env[1207]: time="2025-05-10T00:36:55.125260876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mlz45,Uid:77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:55.125567 kubelet[1444]: E0510 00:36:55.125509 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:55.125647 kubelet[1444]: E0510 00:36:55.125611 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mlz45" May 10 00:36:55.125699 kubelet[1444]: E0510 00:36:55.125650 1444 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mlz45" May 10 00:36:55.125739 kubelet[1444]: E0510 00:36:55.125706 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mlz45_calico-system(77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mlz45_calico-system(77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:55.126368 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6-shm.mount: Deactivated successfully. May 10 00:36:55.346860 kubelet[1444]: E0510 00:36:55.346709 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:55.359036 kubelet[1444]: E0510 00:36:55.358974 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:56.096734 kubelet[1444]: I0510 00:36:56.096696 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:36:56.097508 env[1207]: time="2025-05-10T00:36:56.097474811Z" level=info msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" May 10 00:36:56.121817 env[1207]: time="2025-05-10T00:36:56.121748101Z" level=error msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" failed" error="failed to destroy network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:56.122024 kubelet[1444]: E0510 00:36:56.121987 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:36:56.122102 kubelet[1444]: E0510 00:36:56.122051 1444 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6"} May 10 00:36:56.122152 kubelet[1444]: E0510 00:36:56.122138 1444 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:56.122255 kubelet[1444]: E0510 00:36:56.122170 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mlz45" podUID="77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7" May 10 00:36:56.359220 kubelet[1444]: E0510 00:36:56.359053 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:56.784000 audit[2008]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:56.784000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffa9ca5bf0 a2=0 a3=7fffa9ca5bdc items=0 ppid=1597 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:56.797197 kernel: audit: type=1325 audit(1746837416.784:528): table=filter:75 family=2 entries=9 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:56.797351 kernel: audit: type=1300 audit(1746837416.784:528): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffa9ca5bf0 a2=0 a3=7fffa9ca5bdc items=0 ppid=1597 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:56.797374 kernel: audit: type=1327 audit(1746837416.784:528): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:56.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:56.802000 audit[2008]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:56.802000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffa9ca5bf0 a2=0 a3=7fffa9ca5bdc items=0 ppid=1597 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:56.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:57.360342 kubelet[1444]: E0510 00:36:57.360227 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:58.039177 systemd[1]: Created slice kubepods-besteffort-pod1c33c6f8_ec1f_457f_8c80_7870cae2c3f2.slice. May 10 00:36:58.060840 kubelet[1444]: I0510 00:36:58.060805 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mn75t\" (UniqueName: \"kubernetes.io/projected/1c33c6f8-ec1f-457f-8c80-7870cae2c3f2-kube-api-access-mn75t\") pod \"nginx-deployment-7fcdb87857-rc7f4\" (UID: \"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2\") " pod="default/nginx-deployment-7fcdb87857-rc7f4" May 10 00:36:58.342081 env[1207]: time="2025-05-10T00:36:58.341867491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rc7f4,Uid:1c33c6f8-ec1f-457f-8c80-7870cae2c3f2,Namespace:default,Attempt:0,}" May 10 00:36:58.365504 kubelet[1444]: E0510 00:36:58.365397 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:36:58.450442 env[1207]: time="2025-05-10T00:36:58.450343851Z" level=error msg="Failed to destroy network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:58.452250 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32-shm.mount: Deactivated successfully. May 10 00:36:58.453328 env[1207]: time="2025-05-10T00:36:58.453274097Z" level=error msg="encountered an error cleaning up failed sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:58.453393 env[1207]: time="2025-05-10T00:36:58.453343367Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rc7f4,Uid:1c33c6f8-ec1f-457f-8c80-7870cae2c3f2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:58.453670 kubelet[1444]: E0510 00:36:58.453592 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:58.453773 kubelet[1444]: E0510 00:36:58.453684 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-rc7f4" May 10 00:36:58.453773 kubelet[1444]: E0510 00:36:58.453708 1444 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-rc7f4" May 10 00:36:58.453894 kubelet[1444]: E0510 00:36:58.453778 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-rc7f4_default(1c33c6f8-ec1f-457f-8c80-7870cae2c3f2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-rc7f4_default(1c33c6f8-ec1f-457f-8c80-7870cae2c3f2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-rc7f4" podUID="1c33c6f8-ec1f-457f-8c80-7870cae2c3f2" May 10 00:36:59.104179 kubelet[1444]: I0510 00:36:59.104136 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:36:59.105021 env[1207]: time="2025-05-10T00:36:59.104979060Z" level=info msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" May 10 00:36:59.149199 env[1207]: time="2025-05-10T00:36:59.149092514Z" level=error msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" failed" error="failed to destroy network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:59.149483 kubelet[1444]: E0510 00:36:59.149439 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:36:59.149571 kubelet[1444]: E0510 00:36:59.149504 1444 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32"} May 10 00:36:59.149571 kubelet[1444]: E0510 00:36:59.149544 1444 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:59.149689 kubelet[1444]: E0510 00:36:59.149569 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-rc7f4" podUID="1c33c6f8-ec1f-457f-8c80-7870cae2c3f2" May 10 00:36:59.313000 audit[2075]: NETFILTER_CFG table=filter:77 family=2 entries=8 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.317105 kernel: kauditd_printk_skb: 3 callbacks suppressed May 10 00:36:59.317288 kernel: audit: type=1325 audit(1746837419.313:530): table=filter:77 family=2 entries=8 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.313000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd95cac4a0 a2=0 a3=7ffd95cac48c items=0 ppid=1597 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.324586 kernel: audit: type=1300 audit(1746837419.313:530): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd95cac4a0 a2=0 a3=7ffd95cac48c items=0 ppid=1597 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.324739 kernel: audit: type=1327 audit(1746837419.313:530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:59.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:59.328000 audit[2075]: NETFILTER_CFG table=nat:78 family=2 entries=34 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.328000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd95cac4a0 a2=0 a3=7ffd95cac48c items=0 ppid=1597 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.337278 kernel: audit: type=1325 audit(1746837419.328:531): table=nat:78 family=2 entries=34 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.337358 kernel: audit: type=1300 audit(1746837419.328:531): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd95cac4a0 a2=0 a3=7ffd95cac48c items=0 ppid=1597 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:59.339718 kernel: audit: type=1327 audit(1746837419.328:531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:59.366567 kubelet[1444]: E0510 00:36:59.366398 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:00.367089 kubelet[1444]: E0510 00:37:00.367012 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:01.367979 kubelet[1444]: E0510 00:37:01.367898 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:02.368372 kubelet[1444]: E0510 00:37:02.368298 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:03.369452 kubelet[1444]: E0510 00:37:03.369388 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:03.399409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount391870092.mount: Deactivated successfully. May 10 00:37:03.586570 env[1207]: time="2025-05-10T00:37:03.586476294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:03.588906 env[1207]: time="2025-05-10T00:37:03.588842857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:03.590418 env[1207]: time="2025-05-10T00:37:03.590376784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:03.592308 env[1207]: time="2025-05-10T00:37:03.592270040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:03.592795 env[1207]: time="2025-05-10T00:37:03.592759057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:37:03.601687 env[1207]: time="2025-05-10T00:37:03.601640828Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:37:03.619845 env[1207]: time="2025-05-10T00:37:03.619728240Z" level=info msg="CreateContainer within sandbox \"dc87c2ae54e112522b6216d4563a6d89bd089a805b3ac46d81ff20286a189e2f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0cde7c51636a20214de8df5b7e74d7c3cb98976aa5905328991e43c5e0d0ba95\"" May 10 00:37:03.620282 env[1207]: time="2025-05-10T00:37:03.620251292Z" level=info msg="StartContainer for \"0cde7c51636a20214de8df5b7e74d7c3cb98976aa5905328991e43c5e0d0ba95\"" May 10 00:37:03.635422 systemd[1]: Started cri-containerd-0cde7c51636a20214de8df5b7e74d7c3cb98976aa5905328991e43c5e0d0ba95.scope. May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f48de6cc2f8 items=0 ppid=1521 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.671561 kernel: audit: type=1400 audit(1746837423.662:532): avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.671607 kernel: audit: type=1300 audit(1746837423.662:532): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f48de6cc2f8 items=0 ppid=1521 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.671632 kernel: audit: type=1327 audit(1746837423.662:532): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646537633531363336613230323134646538646635623765373464 May 10 00:37:03.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646537633531363336613230323134646538646635623765373464 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.679165 kernel: audit: type=1400 audit(1746837423.662:533): avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.662000 audit: BPF prog-id=78 op=LOAD May 10 00:37:03.662000 audit[2086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024258 items=0 ppid=1521 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646537633531363336613230323134646538646635623765373464 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.670000 audit: BPF prog-id=79 op=LOAD May 10 00:37:03.670000 audit[2086]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000242a8 items=0 ppid=1521 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646537633531363336613230323134646538646635623765373464 May 10 00:37:03.674000 audit: BPF prog-id=79 op=UNLOAD May 10 00:37:03.674000 audit: BPF prog-id=78 op=UNLOAD May 10 00:37:03.674000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { perfmon } for pid=2086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit[2086]: AVC avc: denied { bpf } for pid=2086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:03.674000 audit: BPF prog-id=80 op=LOAD May 10 00:37:03.674000 audit[2086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024338 items=0 ppid=1521 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646537633531363336613230323134646538646635623765373464 May 10 00:37:03.694049 env[1207]: time="2025-05-10T00:37:03.693986085Z" level=info msg="StartContainer for \"0cde7c51636a20214de8df5b7e74d7c3cb98976aa5905328991e43c5e0d0ba95\" returns successfully" May 10 00:37:03.776848 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:37:03.777054 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:37:04.115381 kubelet[1444]: E0510 00:37:04.115338 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:04.369861 kubelet[1444]: E0510 00:37:04.369692 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:05.034162 kernel: kauditd_printk_skb: 39 callbacks suppressed May 10 00:37:05.034370 kernel: audit: type=1400 audit(1746837425.021:538): avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=19965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.034407 kernel: audit: type=1300 audit(1746837425.021:538): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff52b79a2b a2=241 a3=1b6 items=1 ppid=2175 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.021000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=19965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.021000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff52b79a2b a2=241 a3=1b6 items=1 ppid=2175 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.021000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:37:05.040645 kernel: audit: type=1307 audit(1746837425.021:538): cwd="/etc/service/enabled/bird/log" May 10 00:37:05.040784 kernel: audit: type=1302 audit(1746837425.021:538): item=0 name="/dev/fd/63" inode=19962 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.021000 audit: PATH item=0 name="/dev/fd/63" inode=19962 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.044584 kernel: audit: type=1327 audit(1746837425.021:538): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.053257 kernel: audit: type=1400 audit(1746837425.024:539): avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=19193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.024000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=19193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.024000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc50407a2a a2=241 a3=1b6 items=1 ppid=2174 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.059274 kernel: audit: type=1300 audit(1746837425.024:539): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc50407a2a a2=241 a3=1b6 items=1 ppid=2174 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.024000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:37:05.063988 kernel: audit: type=1307 audit(1746837425.024:539): cwd="/etc/service/enabled/felix/log" May 10 00:37:05.064045 kernel: audit: type=1302 audit(1746837425.024:539): item=0 name="/dev/fd/63" inode=19188 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.024000 audit: PATH item=0 name="/dev/fd/63" inode=19188 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.066882 kernel: audit: type=1327 audit(1746837425.024:539): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.026000 audit[2236]: AVC avc: denied { write } for pid=2236 comm="tee" name="fd" dev="proc" ino=19972 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.026000 audit[2236]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3a634a1a a2=241 a3=1b6 items=1 ppid=2177 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.026000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:37:05.026000 audit: PATH item=0 name="/dev/fd/63" inode=19969 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.026000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.034000 audit[2219]: AVC avc: denied { write } for pid=2219 comm="tee" name="fd" dev="proc" ino=21707 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.034000 audit[2219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4388ba2c a2=241 a3=1b6 items=1 ppid=2176 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.034000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:37:05.034000 audit: PATH item=0 name="/dev/fd/63" inode=21703 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.050000 audit[2246]: AVC avc: denied { write } for pid=2246 comm="tee" name="fd" dev="proc" ino=19202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.050000 audit[2246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd131fea2a a2=241 a3=1b6 items=1 ppid=2185 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.050000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:37:05.050000 audit: PATH item=0 name="/dev/fd/63" inode=19199 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.050000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.074000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=20650 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.074000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda19a3a1b a2=241 a3=1b6 items=1 ppid=2186 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.074000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:37:05.074000 audit: PATH item=0 name="/dev/fd/63" inode=21711 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.089000 audit[2261]: AVC avc: denied { write } for pid=2261 comm="tee" name="fd" dev="proc" ino=19213 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:37:05.089000 audit[2261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff571aaa2a a2=241 a3=1b6 items=1 ppid=2184 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.089000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:37:05.089000 audit: PATH item=0 name="/dev/fd/63" inode=21714 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:05.089000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:37:05.117252 kubelet[1444]: E0510 00:37:05.117198 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit: BPF prog-id=81 op=LOAD May 10 00:37:05.188000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7b78f150 a2=98 a3=3 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.188000 audit: BPF prog-id=81 op=UNLOAD May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit: BPF prog-id=82 op=LOAD May 10 00:37:05.188000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7b78ef30 a2=74 a3=540051 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.188000 audit: BPF prog-id=82 op=UNLOAD May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.188000 audit: BPF prog-id=83 op=LOAD May 10 00:37:05.188000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7b78ef60 a2=94 a3=2 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.188000 audit: BPF prog-id=83 op=UNLOAD May 10 00:37:05.311000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.311000 audit: BPF prog-id=84 op=LOAD May 10 00:37:05.311000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7b78ee20 a2=40 a3=1 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.312000 audit: BPF prog-id=84 op=UNLOAD May 10 00:37:05.312000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.312000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7b78eef0 a2=50 a3=7fff7b78efd0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78ee30 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b78ee60 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b78ed70 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78ee80 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78ee60 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78ee50 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78ee80 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b78ee60 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b78ee80 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b78ee50 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.320000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.320000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7b78eec0 a2=28 a3=0 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7b78ec70 a2=50 a3=1 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit: BPF prog-id=85 op=LOAD May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7b78ec70 a2=94 a3=5 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit: BPF prog-id=85 op=UNLOAD May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7b78ed20 a2=50 a3=1 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7b78ee40 a2=4 a3=38 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { confidentiality } for pid=2316 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7b78ee90 a2=94 a3=6 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { confidentiality } for pid=2316 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7b78e640 a2=94 a3=83 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.321000 audit[2316]: AVC avc: denied { confidentiality } for pid=2316 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.321000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7b78e640 a2=94 a3=83 items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit: BPF prog-id=86 op=LOAD May 10 00:37:05.331000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1ffba760 a2=98 a3=1999999999999999 items=0 ppid=2178 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.331000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:37:05.331000 audit: BPF prog-id=86 op=UNLOAD May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit: BPF prog-id=87 op=LOAD May 10 00:37:05.331000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1ffba640 a2=74 a3=ffff items=0 ppid=2178 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.331000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:37:05.331000 audit: BPF prog-id=87 op=UNLOAD May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.331000 audit: BPF prog-id=88 op=LOAD May 10 00:37:05.331000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1ffba680 a2=40 a3=7fff1ffba860 items=0 ppid=2178 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.331000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:37:05.331000 audit: BPF prog-id=88 op=UNLOAD May 10 00:37:05.370736 kubelet[1444]: E0510 00:37:05.370681 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:05.377750 systemd-networkd[1022]: vxlan.calico: Link UP May 10 00:37:05.377759 systemd-networkd[1022]: vxlan.calico: Gained carrier May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit: BPF prog-id=89 op=LOAD May 10 00:37:05.397000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebbbb5360 a2=98 a3=ffffffff items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.397000 audit: BPF prog-id=89 op=UNLOAD May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit: BPF prog-id=90 op=LOAD May 10 00:37:05.397000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebbbb5170 a2=74 a3=540051 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.397000 audit: BPF prog-id=90 op=UNLOAD May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit: BPF prog-id=91 op=LOAD May 10 00:37:05.397000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebbbb51a0 a2=94 a3=2 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.397000 audit: BPF prog-id=91 op=UNLOAD May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb5070 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.397000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.397000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebbbb50a0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebbbb4fb0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb50c0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb50a0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb5090 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb50c0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebbbb50a0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebbbb50c0 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebbbb5090 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebbbb5100 a2=28 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit: BPF prog-id=92 op=LOAD May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebbbb4f70 a2=40 a3=0 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.398000 audit: BPF prog-id=92 op=UNLOAD May 10 00:37:05.398000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.398000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffebbbb4f60 a2=50 a3=2800 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffebbbb4f60 a2=50 a3=2800 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit: BPF prog-id=93 op=LOAD May 10 00:37:05.399000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebbbb4780 a2=94 a3=2 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.399000 audit: BPF prog-id=93 op=UNLOAD May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.399000 audit: BPF prog-id=94 op=LOAD May 10 00:37:05.399000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebbbb4880 a2=94 a3=30 items=0 ppid=2178 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit: BPF prog-id=95 op=LOAD May 10 00:37:05.402000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9a0fef50 a2=98 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.402000 audit: BPF prog-id=95 op=UNLOAD May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit: BPF prog-id=96 op=LOAD May 10 00:37:05.402000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9a0fed30 a2=74 a3=540051 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.402000 audit: BPF prog-id=96 op=UNLOAD May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.402000 audit: BPF prog-id=97 op=LOAD May 10 00:37:05.402000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9a0fed60 a2=94 a3=2 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.402000 audit: BPF prog-id=97 op=UNLOAD May 10 00:37:05.520000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit: BPF prog-id=98 op=LOAD May 10 00:37:05.520000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9a0fec20 a2=40 a3=1 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.520000 audit: BPF prog-id=98 op=UNLOAD May 10 00:37:05.520000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.520000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9a0fecf0 a2=50 a3=7ffc9a0fedd0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.527000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.527000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fec30 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.527000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.527000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9a0fec60 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.527000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.527000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9a0feb70 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.527000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.527000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fec80 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fec60 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fec50 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fec80 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9a0fec60 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9a0fec80 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9a0fec50 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9a0fecc0 a2=28 a3=0 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9a0fea70 a2=50 a3=1 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit: BPF prog-id=99 op=LOAD May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9a0fea70 a2=94 a3=5 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit: BPF prog-id=99 op=UNLOAD May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9a0feb20 a2=50 a3=1 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9a0fec40 a2=4 a3=38 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { confidentiality } for pid=2350 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9a0fec90 a2=94 a3=6 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { confidentiality } for pid=2350 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9a0fe440 a2=94 a3=83 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.528000 audit[2350]: AVC avc: denied { confidentiality } for pid=2350 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:05.528000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9a0fe440 a2=94 a3=83 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.529000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.529000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a0ffe80 a2=10 a3=208 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.529000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.529000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a0ffd20 a2=10 a3=3 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.529000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.529000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a0ffcc0 a2=10 a3=3 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.529000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:05.529000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a0ffcc0 a2=10 a3=7 items=0 ppid=2178 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:37:05.535000 audit: BPF prog-id=94 op=UNLOAD May 10 00:37:05.578000 audit[2376]: NETFILTER_CFG table=mangle:79 family=2 entries=16 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:05.578000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffda5ce7ec0 a2=0 a3=7ffda5ce7eac items=0 ppid=2178 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.578000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:05.590000 audit[2379]: NETFILTER_CFG table=nat:80 family=2 entries=15 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:05.590000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffb4724e80 a2=0 a3=7fffb4724e6c items=0 ppid=2178 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:05.591000 audit[2380]: NETFILTER_CFG table=filter:81 family=2 entries=39 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:05.591000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcb6a06180 a2=0 a3=7ffcb6a0616c items=0 ppid=2178 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.591000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:05.591000 audit[2377]: NETFILTER_CFG table=raw:82 family=2 entries=21 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:05.591000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff7234ce00 a2=0 a3=7fff7234cdec items=0 ppid=2178 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:05.591000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:06.371379 kubelet[1444]: E0510 00:37:06.371298 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:06.712472 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL May 10 00:37:07.372072 kubelet[1444]: E0510 00:37:07.371981 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:08.373161 kubelet[1444]: E0510 00:37:08.372544 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:09.373177 kubelet[1444]: E0510 00:37:09.373107 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:10.374119 kubelet[1444]: E0510 00:37:10.374048 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:11.051718 env[1207]: time="2025-05-10T00:37:11.051628010Z" level=info msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" May 10 00:37:11.112311 kubelet[1444]: I0510 00:37:11.112194 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-m59nq" podStartSLOduration=10.306447207 podStartE2EDuration="35.112166814s" podCreationTimestamp="2025-05-10 00:36:36 +0000 UTC" firstStartedPulling="2025-05-10 00:36:38.787878106 +0000 UTC m=+3.939327414" lastFinishedPulling="2025-05-10 00:37:03.593597713 +0000 UTC m=+28.745047021" observedRunningTime="2025-05-10 00:37:04.129296832 +0000 UTC m=+29.280746150" watchObservedRunningTime="2025-05-10 00:37:11.112166814 +0000 UTC m=+36.263616112" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.111 [INFO][2414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.112 [INFO][2414] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" iface="eth0" netns="/var/run/netns/cni-6018109b-513f-cc03-760b-77878d22c756" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.112 [INFO][2414] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" iface="eth0" netns="/var/run/netns/cni-6018109b-513f-cc03-760b-77878d22c756" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.112 [INFO][2414] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" iface="eth0" netns="/var/run/netns/cni-6018109b-513f-cc03-760b-77878d22c756" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.112 [INFO][2414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.112 [INFO][2414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.137 [INFO][2423] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.138 [INFO][2423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.138 [INFO][2423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.145 [WARNING][2423] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.145 [INFO][2423] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.146 [INFO][2423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:11.151625 env[1207]: 2025-05-10 00:37:11.149 [INFO][2414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:11.152383 env[1207]: time="2025-05-10T00:37:11.151854873Z" level=info msg="TearDown network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" successfully" May 10 00:37:11.152383 env[1207]: time="2025-05-10T00:37:11.151907544Z" level=info msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" returns successfully" May 10 00:37:11.152899 env[1207]: time="2025-05-10T00:37:11.152856817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mlz45,Uid:77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7,Namespace:calico-system,Attempt:1,}" May 10 00:37:11.153548 systemd[1]: run-netns-cni\x2d6018109b\x2d513f\x2dcc03\x2d760b\x2d77878d22c756.mount: Deactivated successfully. May 10 00:37:11.375372 kubelet[1444]: E0510 00:37:11.375182 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:11.533109 systemd-networkd[1022]: cali98b85d6225b: Link UP May 10 00:37:11.535784 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:37:11.536143 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali98b85d6225b: link becomes ready May 10 00:37:11.535960 systemd-networkd[1022]: cali98b85d6225b: Gained carrier May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.456 [INFO][2431] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.27-k8s-csi--node--driver--mlz45-eth0 csi-node-driver- calico-system 77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7 1095 0 2025-05-10 00:36:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.27 csi-node-driver-mlz45 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali98b85d6225b [] []}} ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.456 [INFO][2431] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.488 [INFO][2447] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" HandleID="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.498 [INFO][2447] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" HandleID="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000517e0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.27", "pod":"csi-node-driver-mlz45", "timestamp":"2025-05-10 00:37:11.4886566 +0000 UTC"}, Hostname:"10.0.0.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.499 [INFO][2447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.499 [INFO][2447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.499 [INFO][2447] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.27' May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.501 [INFO][2447] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.505 [INFO][2447] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.509 [INFO][2447] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.511 [INFO][2447] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.514 [INFO][2447] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.514 [INFO][2447] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.515 [INFO][2447] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.520 [INFO][2447] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.525 [INFO][2447] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.65/26] block=192.168.94.64/26 handle="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.525 [INFO][2447] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.65/26] handle="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" host="10.0.0.27" May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.525 [INFO][2447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:11.550152 env[1207]: 2025-05-10 00:37:11.525 [INFO][2447] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.65/26] IPv6=[] ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" HandleID="k8s-pod-network.a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.527 [INFO][2431] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-csi--node--driver--mlz45-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"", Pod:"csi-node-driver-mlz45", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali98b85d6225b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.527 [INFO][2431] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.65/32] ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.527 [INFO][2431] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali98b85d6225b ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.536 [INFO][2431] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.536 [INFO][2431] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-csi--node--driver--mlz45-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad", Pod:"csi-node-driver-mlz45", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali98b85d6225b", MAC:"86:56:a1:42:e7:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:11.550848 env[1207]: 2025-05-10 00:37:11.547 [INFO][2431] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad" Namespace="calico-system" Pod="csi-node-driver-mlz45" WorkloadEndpoint="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:11.556000 audit[2472]: NETFILTER_CFG table=filter:83 family=2 entries=34 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:11.559641 kernel: kauditd_printk_skb: 505 callbacks suppressed May 10 00:37:11.559712 kernel: audit: type=1325 audit(1746837431.556:640): table=filter:83 family=2 entries=34 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:11.556000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd506a11a0 a2=0 a3=7ffd506a118c items=0 ppid=2178 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.565180 env[1207]: time="2025-05-10T00:37:11.565109460Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:37:11.565180 env[1207]: time="2025-05-10T00:37:11.565145268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:37:11.565180 env[1207]: time="2025-05-10T00:37:11.565154936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:37:11.565485 env[1207]: time="2025-05-10T00:37:11.565312474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad pid=2482 runtime=io.containerd.runc.v2 May 10 00:37:11.567177 kernel: audit: type=1300 audit(1746837431.556:640): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd506a11a0 a2=0 a3=7ffd506a118c items=0 ppid=2178 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.556000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:11.567295 kernel: audit: type=1327 audit(1746837431.556:640): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:11.584111 systemd[1]: Started cri-containerd-a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad.scope. May 10 00:37:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.605211 kernel: audit: type=1400 audit(1746837431.597:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.605337 kernel: audit: type=1400 audit(1746837431.597:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.605379 kernel: audit: type=1400 audit(1746837431.597:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.611573 kernel: audit: type=1400 audit(1746837431.597:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.611649 kernel: audit: type=1400 audit(1746837431.597:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.617514 kernel: audit: type=1400 audit(1746837431.597:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.617618 kernel: audit: type=1400 audit(1746837431.597:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.617741 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:37:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.603000 audit: BPF prog-id=100 op=LOAD May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2482 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343431623266666131393564366637363035393430386461626231 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2482 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343431623266666131393564366637363035393430386461626231 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.604000 audit: BPF prog-id=101 op=LOAD May 10 00:37:11.604000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0001e7770 items=0 ppid=2482 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343431623266666131393564366637363035393430386461626231 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.607000 audit: BPF prog-id=102 op=LOAD May 10 00:37:11.607000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0001e77b8 items=0 ppid=2482 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343431623266666131393564366637363035393430386461626231 May 10 00:37:11.610000 audit: BPF prog-id=102 op=UNLOAD May 10 00:37:11.610000 audit: BPF prog-id=101 op=UNLOAD May 10 00:37:11.610000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:11.610000 audit: BPF prog-id=103 op=LOAD May 10 00:37:11.610000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0001e7bc8 items=0 ppid=2482 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:11.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343431623266666131393564366637363035393430386461626231 May 10 00:37:11.634354 env[1207]: time="2025-05-10T00:37:11.632263947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mlz45,Uid:77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7,Namespace:calico-system,Attempt:1,} returns sandbox id \"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad\"" May 10 00:37:11.634822 env[1207]: time="2025-05-10T00:37:11.634773354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:37:12.376489 kubelet[1444]: E0510 00:37:12.376370 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:13.240534 systemd-networkd[1022]: cali98b85d6225b: Gained IPv6LL May 10 00:37:13.376070 env[1207]: time="2025-05-10T00:37:13.375990180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:13.377027 kubelet[1444]: E0510 00:37:13.376954 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:13.378032 env[1207]: time="2025-05-10T00:37:13.377939726Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:13.379303 env[1207]: time="2025-05-10T00:37:13.379274408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:13.380671 env[1207]: time="2025-05-10T00:37:13.380642802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:13.381208 env[1207]: time="2025-05-10T00:37:13.381157539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:37:13.382986 env[1207]: time="2025-05-10T00:37:13.382946171Z" level=info msg="CreateContainer within sandbox \"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:37:13.399705 env[1207]: time="2025-05-10T00:37:13.399647624Z" level=info msg="CreateContainer within sandbox \"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"977cb732f681715b849b7127adc328c59812c7a00092eaad2d411a7d10962678\"" May 10 00:37:13.400541 env[1207]: time="2025-05-10T00:37:13.400505702Z" level=info msg="StartContainer for \"977cb732f681715b849b7127adc328c59812c7a00092eaad2d411a7d10962678\"" May 10 00:37:13.419082 systemd[1]: run-containerd-runc-k8s.io-977cb732f681715b849b7127adc328c59812c7a00092eaad2d411a7d10962678-runc.E4zalg.mount: Deactivated successfully. May 10 00:37:13.420506 systemd[1]: Started cri-containerd-977cb732f681715b849b7127adc328c59812c7a00092eaad2d411a7d10962678.scope. May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7faca35993b8 items=0 ppid=2482 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937376362373332663638313731356238343962373132376164633332 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit: BPF prog-id=104 op=LOAD May 10 00:37:13.432000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e5f28 items=0 ppid=2482 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937376362373332663638313731356238343962373132376164633332 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.432000 audit: BPF prog-id=105 op=LOAD May 10 00:37:13.432000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e5f78 items=0 ppid=2482 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937376362373332663638313731356238343962373132376164633332 May 10 00:37:13.432000 audit: BPF prog-id=105 op=UNLOAD May 10 00:37:13.433000 audit: BPF prog-id=104 op=UNLOAD May 10 00:37:13.433000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:13.433000 audit: BPF prog-id=106 op=LOAD May 10 00:37:13.433000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b6008 items=0 ppid=2482 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937376362373332663638313731356238343962373132376164633332 May 10 00:37:13.445888 env[1207]: time="2025-05-10T00:37:13.445844536Z" level=info msg="StartContainer for \"977cb732f681715b849b7127adc328c59812c7a00092eaad2d411a7d10962678\" returns successfully" May 10 00:37:13.447150 env[1207]: time="2025-05-10T00:37:13.447122920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:37:14.052233 env[1207]: time="2025-05-10T00:37:14.052149807Z" level=info msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" iface="eth0" netns="/var/run/netns/cni-0d4e7390-444e-757e-31fe-0173fbca20d8" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" iface="eth0" netns="/var/run/netns/cni-0d4e7390-444e-757e-31fe-0173fbca20d8" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" iface="eth0" netns="/var/run/netns/cni-0d4e7390-444e-757e-31fe-0173fbca20d8" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.104 [INFO][2567] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.126 [INFO][2575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.126 [INFO][2575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.126 [INFO][2575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.134 [WARNING][2575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.134 [INFO][2575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.137 [INFO][2575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:14.140309 env[1207]: 2025-05-10 00:37:14.138 [INFO][2567] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:14.140811 env[1207]: time="2025-05-10T00:37:14.140585679Z" level=info msg="TearDown network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" successfully" May 10 00:37:14.140811 env[1207]: time="2025-05-10T00:37:14.140636816Z" level=info msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" returns successfully" May 10 00:37:14.141473 env[1207]: time="2025-05-10T00:37:14.141419759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rc7f4,Uid:1c33c6f8-ec1f-457f-8c80-7870cae2c3f2,Namespace:default,Attempt:1,}" May 10 00:37:14.253816 systemd-networkd[1022]: calie4af2165f0c: Link UP May 10 00:37:14.256228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:37:14.256393 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie4af2165f0c: link becomes ready May 10 00:37:14.256682 systemd-networkd[1022]: calie4af2165f0c: Gained carrier May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.189 [INFO][2584] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0 nginx-deployment-7fcdb87857- default 1c33c6f8-ec1f-457f-8c80-7870cae2c3f2 1112 0 2025-05-10 00:36:58 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.27 nginx-deployment-7fcdb87857-rc7f4 eth0 default [] [] [kns.default ksa.default.default] calie4af2165f0c [] []}} ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.189 [INFO][2584] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.214 [INFO][2598] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" HandleID="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.223 [INFO][2598] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" HandleID="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000395e50), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.27", "pod":"nginx-deployment-7fcdb87857-rc7f4", "timestamp":"2025-05-10 00:37:14.214650595 +0000 UTC"}, Hostname:"10.0.0.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.223 [INFO][2598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.223 [INFO][2598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.223 [INFO][2598] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.27' May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.225 [INFO][2598] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.229 [INFO][2598] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.233 [INFO][2598] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.234 [INFO][2598] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.236 [INFO][2598] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.237 [INFO][2598] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.238 [INFO][2598] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.245 [INFO][2598] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.250 [INFO][2598] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.66/26] block=192.168.94.64/26 handle="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.250 [INFO][2598] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.66/26] handle="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" host="10.0.0.27" May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.250 [INFO][2598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:14.267310 env[1207]: 2025-05-10 00:37:14.250 [INFO][2598] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.66/26] IPv6=[] ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" HandleID="k8s-pod-network.f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.251 [INFO][2584] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2", ResourceVersion:"1112", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-rc7f4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie4af2165f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.252 [INFO][2584] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.66/32] ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.252 [INFO][2584] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie4af2165f0c ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.256 [INFO][2584] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.256 [INFO][2584] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2", ResourceVersion:"1112", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da", Pod:"nginx-deployment-7fcdb87857-rc7f4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie4af2165f0c", MAC:"32:a8:73:a8:b0:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:14.268061 env[1207]: 2025-05-10 00:37:14.264 [INFO][2584] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da" Namespace="default" Pod="nginx-deployment-7fcdb87857-rc7f4" WorkloadEndpoint="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:14.276000 audit[2619]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:14.276000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffd4621edd0 a2=0 a3=7ffd4621edbc items=0 ppid=2178 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.276000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:14.281511 env[1207]: time="2025-05-10T00:37:14.281426616Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:37:14.281511 env[1207]: time="2025-05-10T00:37:14.281473304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:37:14.281511 env[1207]: time="2025-05-10T00:37:14.281486449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:37:14.281808 env[1207]: time="2025-05-10T00:37:14.281719321Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da pid=2627 runtime=io.containerd.runc.v2 May 10 00:37:14.293652 systemd[1]: Started cri-containerd-f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da.scope. May 10 00:37:14.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.305000 audit: BPF prog-id=107 op=LOAD May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2627 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613365623438643231303638656635633566353564623065336236 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2627 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613365623438643231303638656635633566353564623065336236 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit: BPF prog-id=108 op=LOAD May 10 00:37:14.306000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a3a50 items=0 ppid=2627 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613365623438643231303638656635633566353564623065336236 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit: BPF prog-id=109 op=LOAD May 10 00:37:14.306000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a3a98 items=0 ppid=2627 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613365623438643231303638656635633566353564623065336236 May 10 00:37:14.306000 audit: BPF prog-id=109 op=UNLOAD May 10 00:37:14.306000 audit: BPF prog-id=108 op=UNLOAD May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:14.306000 audit: BPF prog-id=110 op=LOAD May 10 00:37:14.306000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a3ea8 items=0 ppid=2627 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:14.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613365623438643231303638656635633566353564623065336236 May 10 00:37:14.308213 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:37:14.336737 env[1207]: time="2025-05-10T00:37:14.336663860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rc7f4,Uid:1c33c6f8-ec1f-457f-8c80-7870cae2c3f2,Namespace:default,Attempt:1,} returns sandbox id \"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da\"" May 10 00:37:14.378137 kubelet[1444]: E0510 00:37:14.378028 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:14.396819 systemd[1]: run-netns-cni\x2d0d4e7390\x2d444e\x2d757e\x2d31fe\x2d0173fbca20d8.mount: Deactivated successfully. May 10 00:37:14.633228 update_engine[1203]: I0510 00:37:14.633034 1203 update_attempter.cc:509] Updating boot flags... May 10 00:37:15.288504 systemd-networkd[1022]: calie4af2165f0c: Gained IPv6LL May 10 00:37:15.347525 kubelet[1444]: E0510 00:37:15.347446 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:15.379137 kubelet[1444]: E0510 00:37:15.379067 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:15.845475 env[1207]: time="2025-05-10T00:37:15.845394074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:15.847875 env[1207]: time="2025-05-10T00:37:15.847786204Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:15.849583 env[1207]: time="2025-05-10T00:37:15.849507715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:15.865486 env[1207]: time="2025-05-10T00:37:15.865411205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:15.866266 env[1207]: time="2025-05-10T00:37:15.866205961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:37:15.867575 env[1207]: time="2025-05-10T00:37:15.867549355Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:37:15.868969 env[1207]: time="2025-05-10T00:37:15.868899813Z" level=info msg="CreateContainer within sandbox \"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:37:15.941379 env[1207]: time="2025-05-10T00:37:15.941313030Z" level=info msg="CreateContainer within sandbox \"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"41763935de45838c111ced87b0118fa829b2d44af7802b8eae548061e53699c1\"" May 10 00:37:15.942072 env[1207]: time="2025-05-10T00:37:15.942032522Z" level=info msg="StartContainer for \"41763935de45838c111ced87b0118fa829b2d44af7802b8eae548061e53699c1\"" May 10 00:37:15.959968 systemd[1]: Started cri-containerd-41763935de45838c111ced87b0118fa829b2d44af7802b8eae548061e53699c1.scope. May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb8a81dcc28 items=0 ppid=2482 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:15.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373633393335646534353833386331313163656438376230313138 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.975000 audit: BPF prog-id=111 op=LOAD May 10 00:37:15.975000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6bd8 items=0 ppid=2482 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:15.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373633393335646534353833386331313163656438376230313138 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit: BPF prog-id=112 op=LOAD May 10 00:37:15.976000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6c28 items=0 ppid=2482 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:15.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373633393335646534353833386331313163656438376230313138 May 10 00:37:15.976000 audit: BPF prog-id=112 op=UNLOAD May 10 00:37:15.976000 audit: BPF prog-id=111 op=UNLOAD May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:15.976000 audit: BPF prog-id=113 op=LOAD May 10 00:37:15.976000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6cb8 items=0 ppid=2482 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:15.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373633393335646534353833386331313163656438376230313138 May 10 00:37:15.993844 env[1207]: time="2025-05-10T00:37:15.993768108Z" level=info msg="StartContainer for \"41763935de45838c111ced87b0118fa829b2d44af7802b8eae548061e53699c1\" returns successfully" May 10 00:37:16.057335 kubelet[1444]: I0510 00:37:16.057278 1444 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:37:16.057335 kubelet[1444]: I0510 00:37:16.057330 1444 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:37:16.159191 kubelet[1444]: I0510 00:37:16.159027 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mlz45" podStartSLOduration=35.925614529 podStartE2EDuration="40.159009517s" podCreationTimestamp="2025-05-10 00:36:36 +0000 UTC" firstStartedPulling="2025-05-10 00:37:11.633810766 +0000 UTC m=+36.785260074" lastFinishedPulling="2025-05-10 00:37:15.867205754 +0000 UTC m=+41.018655062" observedRunningTime="2025-05-10 00:37:16.158752621 +0000 UTC m=+41.310201939" watchObservedRunningTime="2025-05-10 00:37:16.159009517 +0000 UTC m=+41.310458825" May 10 00:37:16.379532 kubelet[1444]: E0510 00:37:16.379461 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:17.379730 kubelet[1444]: E0510 00:37:17.379654 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:18.380057 kubelet[1444]: E0510 00:37:18.379978 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:19.007743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1644160676.mount: Deactivated successfully. May 10 00:37:19.380403 kubelet[1444]: E0510 00:37:19.380257 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:20.381068 kubelet[1444]: E0510 00:37:20.380999 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:21.100199 env[1207]: time="2025-05-10T00:37:21.100134983Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:21.102073 env[1207]: time="2025-05-10T00:37:21.102015032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:21.103753 env[1207]: time="2025-05-10T00:37:21.103717186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:21.106391 env[1207]: time="2025-05-10T00:37:21.106356430Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:21.107054 env[1207]: time="2025-05-10T00:37:21.107019261Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:37:21.109309 env[1207]: time="2025-05-10T00:37:21.109276813Z" level=info msg="CreateContainer within sandbox \"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 00:37:21.123814 env[1207]: time="2025-05-10T00:37:21.123740954Z" level=info msg="CreateContainer within sandbox \"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c9555d87bdc36f5c4601503983d7b5f052d4d3bd10945f107bfdb0995af1348a\"" May 10 00:37:21.124451 env[1207]: time="2025-05-10T00:37:21.124407091Z" level=info msg="StartContainer for \"c9555d87bdc36f5c4601503983d7b5f052d4d3bd10945f107bfdb0995af1348a\"" May 10 00:37:21.144975 systemd[1]: Started cri-containerd-c9555d87bdc36f5c4601503983d7b5f052d4d3bd10945f107bfdb0995af1348a.scope. May 10 00:37:21.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.156902 kernel: kauditd_printk_skb: 196 callbacks suppressed May 10 00:37:21.156981 kernel: audit: type=1400 audit(1746837441.154:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.164523 kernel: audit: type=1400 audit(1746837441.154:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.164717 kernel: audit: type=1400 audit(1746837441.154:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.172043 kernel: audit: type=1400 audit(1746837441.154:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.172094 kernel: audit: type=1400 audit(1746837441.154:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.179582 kernel: audit: type=1400 audit(1746837441.154:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.179633 kernel: audit: type=1400 audit(1746837441.154:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.186375 kernel: audit: type=1400 audit(1746837441.154:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.186422 kernel: audit: type=1400 audit(1746837441.154:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.190948 kernel: audit: type=1400 audit(1746837441.154:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.154000 audit: BPF prog-id=114 op=LOAD May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2627 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:21.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353535643837626463333666356334363031353033393833643762 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2627 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:21.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353535643837626463333666356334363031353033393833643762 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.155000 audit: BPF prog-id=115 op=LOAD May 10 00:37:21.155000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca1e0 items=0 ppid=2627 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:21.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353535643837626463333666356334363031353033393833643762 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.159000 audit: BPF prog-id=116 op=LOAD May 10 00:37:21.159000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca228 items=0 ppid=2627 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:21.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353535643837626463333666356334363031353033393833643762 May 10 00:37:21.166000 audit: BPF prog-id=116 op=UNLOAD May 10 00:37:21.166000 audit: BPF prog-id=115 op=UNLOAD May 10 00:37:21.166000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:21.166000 audit: BPF prog-id=117 op=LOAD May 10 00:37:21.166000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca638 items=0 ppid=2627 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:21.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353535643837626463333666356334363031353033393833643762 May 10 00:37:21.199718 env[1207]: time="2025-05-10T00:37:21.199654225Z" level=info msg="StartContainer for \"c9555d87bdc36f5c4601503983d7b5f052d4d3bd10945f107bfdb0995af1348a\" returns successfully" May 10 00:37:21.381658 kubelet[1444]: E0510 00:37:21.381488 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:22.171972 kubelet[1444]: I0510 00:37:22.171898 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-rc7f4" podStartSLOduration=17.401729178 podStartE2EDuration="24.17187306s" podCreationTimestamp="2025-05-10 00:36:58 +0000 UTC" firstStartedPulling="2025-05-10 00:37:14.337832695 +0000 UTC m=+39.489282004" lastFinishedPulling="2025-05-10 00:37:21.107976578 +0000 UTC m=+46.259425886" observedRunningTime="2025-05-10 00:37:22.171807365 +0000 UTC m=+47.323256663" watchObservedRunningTime="2025-05-10 00:37:22.17187306 +0000 UTC m=+47.323322378" May 10 00:37:22.381981 kubelet[1444]: E0510 00:37:22.381889 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:23.383122 kubelet[1444]: E0510 00:37:23.383049 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:24.383684 kubelet[1444]: E0510 00:37:24.383605 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:25.384785 kubelet[1444]: E0510 00:37:25.384719 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:25.968000 audit[2788]: NETFILTER_CFG table=filter:85 family=2 entries=20 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.968000 audit[2788]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe0e662a10 a2=0 a3=7ffe0e6629fc items=0 ppid=1597 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.974000 audit[2788]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.974000 audit[2788]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe0e662a10 a2=0 a3=0 items=0 ppid=1597 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.989000 audit[2790]: NETFILTER_CFG table=filter:87 family=2 entries=32 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.989000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed0584a50 a2=0 a3=7ffed0584a3c items=0 ppid=1597 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.995000 audit[2790]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.995000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed0584a50 a2=0 a3=0 items=0 ppid=1597 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.995000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:26.011312 systemd[1]: Created slice kubepods-besteffort-pod124cb206_2b60_491c_960d_52c1474f18b9.slice. May 10 00:37:26.054936 kubelet[1444]: I0510 00:37:26.054870 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/124cb206-2b60-491c-960d-52c1474f18b9-data\") pod \"nfs-server-provisioner-0\" (UID: \"124cb206-2b60-491c-960d-52c1474f18b9\") " pod="default/nfs-server-provisioner-0" May 10 00:37:26.054936 kubelet[1444]: I0510 00:37:26.054918 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6vsq7\" (UniqueName: \"kubernetes.io/projected/124cb206-2b60-491c-960d-52c1474f18b9-kube-api-access-6vsq7\") pod \"nfs-server-provisioner-0\" (UID: \"124cb206-2b60-491c-960d-52c1474f18b9\") " pod="default/nfs-server-provisioner-0" May 10 00:37:26.315418 env[1207]: time="2025-05-10T00:37:26.315271111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:124cb206-2b60-491c-960d-52c1474f18b9,Namespace:default,Attempt:0,}" May 10 00:37:26.385272 kubelet[1444]: E0510 00:37:26.385179 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:26.596184 systemd-networkd[1022]: cali60e51b789ff: Link UP May 10 00:37:26.599375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:37:26.599515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 00:37:26.599714 systemd-networkd[1022]: cali60e51b789ff: Gained carrier May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.522 [INFO][2793] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.27-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 124cb206-2b60-491c-960d-52c1474f18b9 1175 0 2025-05-10 00:37:25 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.27 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.522 [INFO][2793] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.555 [INFO][2808] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" HandleID="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Workload="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.566 [INFO][2808] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" HandleID="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Workload="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ae860), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.27", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 00:37:26.555436847 +0000 UTC"}, Hostname:"10.0.0.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.566 [INFO][2808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.566 [INFO][2808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.566 [INFO][2808] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.27' May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.568 [INFO][2808] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.572 [INFO][2808] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.577 [INFO][2808] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.578 [INFO][2808] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.581 [INFO][2808] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.581 [INFO][2808] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.582 [INFO][2808] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.587 [INFO][2808] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.592 [INFO][2808] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.67/26] block=192.168.94.64/26 handle="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.592 [INFO][2808] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.67/26] handle="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" host="10.0.0.27" May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.592 [INFO][2808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:26.610110 env[1207]: 2025-05-10 00:37:26.592 [INFO][2808] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.67/26] IPv6=[] ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" HandleID="k8s-pod-network.85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Workload="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.611083 env[1207]: 2025-05-10 00:37:26.593 [INFO][2793] cni-plugin/k8s.go 386: Populated endpoint ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"124cb206-2b60-491c-960d-52c1474f18b9", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 37, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:26.611083 env[1207]: 2025-05-10 00:37:26.594 [INFO][2793] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.67/32] ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.611083 env[1207]: 2025-05-10 00:37:26.594 [INFO][2793] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.611083 env[1207]: 2025-05-10 00:37:26.599 [INFO][2793] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.611361 env[1207]: 2025-05-10 00:37:26.599 [INFO][2793] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"124cb206-2b60-491c-960d-52c1474f18b9", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 37, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8a:3c:46:4e:ff:5f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:26.611361 env[1207]: 2025-05-10 00:37:26.608 [INFO][2793] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.27-k8s-nfs--server--provisioner--0-eth0" May 10 00:37:26.620000 audit[2831]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:26.623741 kernel: kauditd_printk_skb: 59 callbacks suppressed May 10 00:37:26.623879 kernel: audit: type=1325 audit(1746837446.620:712): table=filter:89 family=2 entries=38 op=nft_register_chain pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:26.620000 audit[2831]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffe136652b0 a2=0 a3=7ffe1366529c items=0 ppid=2178 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.634740 kernel: audit: type=1300 audit(1746837446.620:712): arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffe136652b0 a2=0 a3=7ffe1366529c items=0 ppid=2178 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.634821 kernel: audit: type=1327 audit(1746837446.620:712): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:26.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:26.786661 env[1207]: time="2025-05-10T00:37:26.786562736Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:37:26.786661 env[1207]: time="2025-05-10T00:37:26.786602010Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:37:26.786661 env[1207]: time="2025-05-10T00:37:26.786611558Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:37:26.786914 env[1207]: time="2025-05-10T00:37:26.786817957Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b pid=2839 runtime=io.containerd.runc.v2 May 10 00:37:26.801731 systemd[1]: Started cri-containerd-85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b.scope. May 10 00:37:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.818962 kernel: audit: type=1400 audit(1746837446.810:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.819111 kernel: audit: type=1400 audit(1746837446.810:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.819134 kernel: audit: type=1400 audit(1746837446.810:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.825903 kernel: audit: type=1400 audit(1746837446.810:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.825963 kernel: audit: type=1400 audit(1746837446.810:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.829536 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:37:26.832829 kernel: audit: type=1400 audit(1746837446.810:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.832896 kernel: audit: type=1400 audit(1746837446.810:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit: BPF prog-id=118 op=LOAD May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2839 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653561366133636233313163666236306232363861663235616131 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2839 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653561366133636233313163666236306232363861663235616131 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.814000 audit: BPF prog-id=119 op=LOAD May 10 00:37:26.814000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003089d0 items=0 ppid=2839 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653561366133636233313163666236306232363861663235616131 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.817000 audit: BPF prog-id=120 op=LOAD May 10 00:37:26.817000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308a18 items=0 ppid=2839 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653561366133636233313163666236306232363861663235616131 May 10 00:37:26.821000 audit: BPF prog-id=120 op=UNLOAD May 10 00:37:26.821000 audit: BPF prog-id=119 op=UNLOAD May 10 00:37:26.821000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:26.821000 audit: BPF prog-id=121 op=LOAD May 10 00:37:26.821000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308e28 items=0 ppid=2839 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653561366133636233313163666236306232363861663235616131 May 10 00:37:26.864761 env[1207]: time="2025-05-10T00:37:26.864620089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:124cb206-2b60-491c-960d-52c1474f18b9,Namespace:default,Attempt:0,} returns sandbox id \"85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b\"" May 10 00:37:26.872937 env[1207]: time="2025-05-10T00:37:26.872883194Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 00:37:27.386427 kubelet[1444]: E0510 00:37:27.386371 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:28.088514 systemd-networkd[1022]: cali60e51b789ff: Gained IPv6LL May 10 00:37:28.387751 kubelet[1444]: E0510 00:37:28.387535 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:29.377570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2419005083.mount: Deactivated successfully. May 10 00:37:29.388211 kubelet[1444]: E0510 00:37:29.388165 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:30.388883 kubelet[1444]: E0510 00:37:30.388811 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:31.389405 kubelet[1444]: E0510 00:37:31.389324 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:32.390018 kubelet[1444]: E0510 00:37:32.389932 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:32.867920 env[1207]: time="2025-05-10T00:37:32.867839833Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:32.870482 env[1207]: time="2025-05-10T00:37:32.870400963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:32.872597 env[1207]: time="2025-05-10T00:37:32.872563662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:32.874576 env[1207]: time="2025-05-10T00:37:32.874517579Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:32.875590 env[1207]: time="2025-05-10T00:37:32.875548820Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 00:37:32.878043 env[1207]: time="2025-05-10T00:37:32.878009210Z" level=info msg="CreateContainer within sandbox \"85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 00:37:32.892342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2608887919.mount: Deactivated successfully. May 10 00:37:32.896534 env[1207]: time="2025-05-10T00:37:32.896477954Z" level=info msg="CreateContainer within sandbox \"85e5a6a3cb311cfb60b268af25aa1ebd752cf5c14ed68d18723ff2807999914b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f0cd365dceebb8da2fe29e4743c6736b7425008a3ad1988be22b32afe196cee2\"" May 10 00:37:32.897209 env[1207]: time="2025-05-10T00:37:32.897174244Z" level=info msg="StartContainer for \"f0cd365dceebb8da2fe29e4743c6736b7425008a3ad1988be22b32afe196cee2\"" May 10 00:37:32.919443 systemd[1]: run-containerd-runc-k8s.io-f0cd365dceebb8da2fe29e4743c6736b7425008a3ad1988be22b32afe196cee2-runc.jHLqdW.mount: Deactivated successfully. May 10 00:37:32.921804 systemd[1]: Started cri-containerd-f0cd365dceebb8da2fe29e4743c6736b7425008a3ad1988be22b32afe196cee2.scope. May 10 00:37:32.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934827 kernel: kauditd_printk_skb: 50 callbacks suppressed May 10 00:37:32.934885 kernel: audit: type=1400 audit(1746837452.932:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.940687 kernel: audit: type=1400 audit(1746837452.932:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.940743 kernel: audit: type=1400 audit(1746837452.932:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.946945 kernel: audit: type=1400 audit(1746837452.932:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.946991 kernel: audit: type=1400 audit(1746837452.932:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.952812 kernel: audit: type=1400 audit(1746837452.932:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.952877 kernel: audit: type=1400 audit(1746837452.932:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.955776 kernel: audit: type=1400 audit(1746837452.932:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.961727 kernel: audit: type=1400 audit(1746837452.932:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.961772 kernel: audit: type=1400 audit(1746837452.933:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.933000 audit: BPF prog-id=122 op=LOAD May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:32.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636433363564636565626238646132666532396534373433633637 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:32.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636433363564636565626238646132666532396534373433633637 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.934000 audit: BPF prog-id=123 op=LOAD May 10 00:37:32.934000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b8d10 items=0 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:32.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636433363564636565626238646132666532396534373433633637 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.936000 audit: BPF prog-id=124 op=LOAD May 10 00:37:32.936000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b8d58 items=0 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:32.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636433363564636565626238646132666532396534373433633637 May 10 00:37:32.942000 audit: BPF prog-id=124 op=UNLOAD May 10 00:37:32.942000 audit: BPF prog-id=123 op=UNLOAD May 10 00:37:32.942000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:32.942000 audit: BPF prog-id=125 op=LOAD May 10 00:37:32.942000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b9168 items=0 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:32.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636433363564636565626238646132666532396534373433633637 May 10 00:37:32.976609 env[1207]: time="2025-05-10T00:37:32.976514978Z" level=info msg="StartContainer for \"f0cd365dceebb8da2fe29e4743c6736b7425008a3ad1988be22b32afe196cee2\" returns successfully" May 10 00:37:33.019000 audit[2912]: AVC avc: denied { search } for pid=2912 comm="rpcbind" name="crypto" dev="proc" ino=23072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:37:33.019000 audit[2912]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f051903b0c0 a2=0 a3=0 items=0 ppid=2894 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 key=(null) May 10 00:37:33.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 10 00:37:33.053000 audit[2917]: AVC avc: denied { search } for pid=2917 comm="dbus-daemon" name="crypto" dev="proc" ino=23072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:37:33.053000 audit[2917]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0fc93670c0 a2=0 a3=0 items=0 ppid=2894 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 key=(null) May 10 00:37:33.053000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:37:33.056000 audit[2918]: AVC avc: denied { watch } for pid=2918 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538178 scontext=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c769,c1006 tclass=dir permissive=0 May 10 00:37:33.056000 audit[2918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d1b4755380 a2=2c8 a3=7ffef7d0caac items=0 ppid=2894 pid=2918 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 key=(null) May 10 00:37:33.056000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:37:33.060000 audit[2919]: AVC avc: denied { read } for pid=2919 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22475 scontext=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 10 00:37:33.060000 audit[2919]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3035993320 a1=80000 a2=d a3=7ffcbabe29e0 items=0 ppid=2894 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 key=(null) May 10 00:37:33.060000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:37:33.061000 audit[2919]: AVC avc: denied { search } for pid=2919 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:37:33.061000 audit[2919]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3034ee70c0 a2=0 a3=0 items=0 ppid=2894 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c769,c1006 key=(null) May 10 00:37:33.061000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:37:33.214000 audit[2937]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:33.214000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffee7d39e70 a2=0 a3=7ffee7d39e5c items=0 ppid=1597 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:33.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:33.219000 audit[2937]: NETFILTER_CFG table=nat:91 family=2 entries=106 op=nft_register_chain pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:33.219000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffee7d39e70 a2=0 a3=7ffee7d39e5c items=0 ppid=1597 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:33.219000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:33.390908 kubelet[1444]: E0510 00:37:33.390844 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:34.391350 kubelet[1444]: E0510 00:37:34.391283 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:35.188213 kubelet[1444]: E0510 00:37:35.188176 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:35.202000 kubelet[1444]: I0510 00:37:35.201932 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=4.197665704 podStartE2EDuration="10.201910102s" podCreationTimestamp="2025-05-10 00:37:25 +0000 UTC" firstStartedPulling="2025-05-10 00:37:26.872500482 +0000 UTC m=+52.023949790" lastFinishedPulling="2025-05-10 00:37:32.87674488 +0000 UTC m=+58.028194188" observedRunningTime="2025-05-10 00:37:33.201819119 +0000 UTC m=+58.353268447" watchObservedRunningTime="2025-05-10 00:37:35.201910102 +0000 UTC m=+60.353359410" May 10 00:37:35.346821 kubelet[1444]: E0510 00:37:35.346742 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:35.384841 env[1207]: time="2025-05-10T00:37:35.384791232Z" level=info msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" May 10 00:37:35.391977 kubelet[1444]: E0510 00:37:35.391909 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.426 [WARNING][2975] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-csi--node--driver--mlz45-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7", ResourceVersion:"1126", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad", Pod:"csi-node-driver-mlz45", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali98b85d6225b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.426 [INFO][2975] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.426 [INFO][2975] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" iface="eth0" netns="" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.426 [INFO][2975] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.426 [INFO][2975] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.448 [INFO][2983] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.448 [INFO][2983] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.448 [INFO][2983] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.455 [WARNING][2983] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.455 [INFO][2983] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.458 [INFO][2983] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:35.461089 env[1207]: 2025-05-10 00:37:35.459 [INFO][2975] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.461650 env[1207]: time="2025-05-10T00:37:35.461133482Z" level=info msg="TearDown network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" successfully" May 10 00:37:35.461650 env[1207]: time="2025-05-10T00:37:35.461179508Z" level=info msg="StopPodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" returns successfully" May 10 00:37:35.462028 env[1207]: time="2025-05-10T00:37:35.461985063Z" level=info msg="RemovePodSandbox for \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" May 10 00:37:35.462105 env[1207]: time="2025-05-10T00:37:35.462036690Z" level=info msg="Forcibly stopping sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\"" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.497 [WARNING][3005] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-csi--node--driver--mlz45-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77a459ed-4cf8-4e21-9ce3-7ce517f0b2b7", ResourceVersion:"1126", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"a1441b2ffa195d6f76059408dabb1798cfcd6761fab6d0c20dca3f5dc252e2ad", Pod:"csi-node-driver-mlz45", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali98b85d6225b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.497 [INFO][3005] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.497 [INFO][3005] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" iface="eth0" netns="" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.497 [INFO][3005] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.497 [INFO][3005] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.516 [INFO][3014] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.516 [INFO][3014] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.516 [INFO][3014] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.523 [WARNING][3014] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.523 [INFO][3014] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" HandleID="k8s-pod-network.8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" Workload="10.0.0.27-k8s-csi--node--driver--mlz45-eth0" May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.525 [INFO][3014] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:35.527899 env[1207]: 2025-05-10 00:37:35.526 [INFO][3005] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6" May 10 00:37:35.528501 env[1207]: time="2025-05-10T00:37:35.527933494Z" level=info msg="TearDown network for sandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" successfully" May 10 00:37:35.586956 env[1207]: time="2025-05-10T00:37:35.586864037Z" level=info msg="RemovePodSandbox \"8a1b28cef7c57ee2f72e31c5dabbc887745fb6a62f4a71ae1470b1a1c7c5dbb6\" returns successfully" May 10 00:37:35.587653 env[1207]: time="2025-05-10T00:37:35.587581948Z" level=info msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.625 [WARNING][3038] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2", ResourceVersion:"1146", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da", Pod:"nginx-deployment-7fcdb87857-rc7f4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie4af2165f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.626 [INFO][3038] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.626 [INFO][3038] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" iface="eth0" netns="" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.626 [INFO][3038] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.626 [INFO][3038] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.644 [INFO][3046] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.644 [INFO][3046] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.644 [INFO][3046] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.650 [WARNING][3046] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.650 [INFO][3046] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.652 [INFO][3046] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:35.654308 env[1207]: 2025-05-10 00:37:35.653 [INFO][3038] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.654921 env[1207]: time="2025-05-10T00:37:35.654342466Z" level=info msg="TearDown network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" successfully" May 10 00:37:35.654921 env[1207]: time="2025-05-10T00:37:35.654382852Z" level=info msg="StopPodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" returns successfully" May 10 00:37:35.655004 env[1207]: time="2025-05-10T00:37:35.654976488Z" level=info msg="RemovePodSandbox for \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" May 10 00:37:35.655051 env[1207]: time="2025-05-10T00:37:35.655010011Z" level=info msg="Forcibly stopping sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\"" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.686 [WARNING][3070] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"1c33c6f8-ec1f-457f-8c80-7870cae2c3f2", ResourceVersion:"1146", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"f7a3eb48d21068ef5c5f55db0e3b60ec3e5ad6454faef0348c998c8338cc77da", Pod:"nginx-deployment-7fcdb87857-rc7f4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie4af2165f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.686 [INFO][3070] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.687 [INFO][3070] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" iface="eth0" netns="" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.687 [INFO][3070] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.687 [INFO][3070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.708 [INFO][3079] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.708 [INFO][3079] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.708 [INFO][3079] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.713 [WARNING][3079] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.713 [INFO][3079] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" HandleID="k8s-pod-network.a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" Workload="10.0.0.27-k8s-nginx--deployment--7fcdb87857--rc7f4-eth0" May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.715 [INFO][3079] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:35.717435 env[1207]: 2025-05-10 00:37:35.716 [INFO][3070] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32" May 10 00:37:35.717435 env[1207]: time="2025-05-10T00:37:35.717406552Z" level=info msg="TearDown network for sandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" successfully" May 10 00:37:35.720897 env[1207]: time="2025-05-10T00:37:35.720861149Z" level=info msg="RemovePodSandbox \"a4a1348cdbd1cdfceaa47da3844dd7490ea3ed73ba248701d7d119b50fe67c32\" returns successfully" May 10 00:37:36.392154 kubelet[1444]: E0510 00:37:36.392093 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:37.392864 kubelet[1444]: E0510 00:37:37.392797 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:38.393381 kubelet[1444]: E0510 00:37:38.393308 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:39.393859 kubelet[1444]: E0510 00:37:39.393784 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:40.394338 kubelet[1444]: E0510 00:37:40.394275 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:41.395411 kubelet[1444]: E0510 00:37:41.395326 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:42.396552 kubelet[1444]: E0510 00:37:42.396460 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:42.901259 systemd[1]: Created slice kubepods-besteffort-podf5ffb1f0_9e6a_4dc2_b665_297d08cefddf.slice. May 10 00:37:42.964001 kubelet[1444]: I0510 00:37:42.963930 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d9bf5b83-cc7d-4b61-b849-c3952d7cb95b\" (UniqueName: \"kubernetes.io/nfs/f5ffb1f0-9e6a-4dc2-b665-297d08cefddf-pvc-d9bf5b83-cc7d-4b61-b849-c3952d7cb95b\") pod \"test-pod-1\" (UID: \"f5ffb1f0-9e6a-4dc2-b665-297d08cefddf\") " pod="default/test-pod-1" May 10 00:37:42.964001 kubelet[1444]: I0510 00:37:42.963984 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hl4vp\" (UniqueName: \"kubernetes.io/projected/f5ffb1f0-9e6a-4dc2-b665-297d08cefddf-kube-api-access-hl4vp\") pod \"test-pod-1\" (UID: \"f5ffb1f0-9e6a-4dc2-b665-297d08cefddf\") " pod="default/test-pod-1" May 10 00:37:43.077000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.080753 kernel: Failed to create system directory netfs May 10 00:37:43.080915 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:37:43.080936 kernel: audit: type=1400 audit(1746837463.077:756): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.080960 kernel: Failed to create system directory netfs May 10 00:37:43.080975 kernel: Failed to create system directory netfs May 10 00:37:43.081624 kernel: audit: type=1400 audit(1746837463.077:756): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.077000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.085353 kernel: Failed to create system directory netfs May 10 00:37:43.077000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.095226 kernel: audit: type=1400 audit(1746837463.077:756): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.095293 kernel: audit: type=1400 audit(1746837463.077:756): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.077000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.077000 audit[3097]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594f2a2a5e0 a1=153bc a2=5594c46b92b0 a3=5 items=0 ppid=62 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.077000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:37:43.107286 kernel: audit: type=1300 audit(1746837463.077:756): arch=c000003e syscall=175 success=yes exit=0 a0=5594f2a2a5e0 a1=153bc a2=5594c46b92b0 a3=5 items=0 ppid=62 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.107449 kernel: audit: type=1327 audit(1746837463.077:756): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:37:43.107472 kernel: Failed to create system directory fscache May 10 00:37:43.107507 kernel: audit: type=1400 audit(1746837463.103:757): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.112073 kernel: Failed to create system directory fscache May 10 00:37:43.112202 kernel: audit: type=1400 audit(1746837463.103:757): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.116637 kernel: Failed to create system directory fscache May 10 00:37:43.116733 kernel: audit: type=1400 audit(1746837463.103:757): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.122550 kernel: Failed to create system directory fscache May 10 00:37:43.122660 kernel: audit: type=1400 audit(1746837463.103:757): avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.122694 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.127304 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.128205 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.130019 kernel: Failed to create system directory fscache May 10 00:37:43.130056 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.131662 kernel: Failed to create system directory fscache May 10 00:37:43.131705 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.133298 kernel: Failed to create system directory fscache May 10 00:37:43.133333 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.103000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.134846 kernel: Failed to create system directory fscache May 10 00:37:43.103000 audit[3097]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594f2c3f9c0 a1=4c0fc a2=5594c46b92b0 a3=5 items=0 ppid=62 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.103000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:37:43.137264 kernel: FS-Cache: Loaded May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.169116 kernel: Failed to create system directory sunrpc May 10 00:37:43.169281 kernel: Failed to create system directory sunrpc May 10 00:37:43.169318 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.170735 kernel: Failed to create system directory sunrpc May 10 00:37:43.170772 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.172283 kernel: Failed to create system directory sunrpc May 10 00:37:43.172312 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.173906 kernel: Failed to create system directory sunrpc May 10 00:37:43.173944 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.175567 kernel: Failed to create system directory sunrpc May 10 00:37:43.175608 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.177979 kernel: Failed to create system directory sunrpc May 10 00:37:43.178030 kernel: Failed to create system directory sunrpc May 10 00:37:43.178046 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.179569 kernel: Failed to create system directory sunrpc May 10 00:37:43.179608 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.181845 kernel: Failed to create system directory sunrpc May 10 00:37:43.181874 kernel: Failed to create system directory sunrpc May 10 00:37:43.181888 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.182595 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.184863 kernel: Failed to create system directory sunrpc May 10 00:37:43.184913 kernel: Failed to create system directory sunrpc May 10 00:37:43.184936 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.185611 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.187971 kernel: Failed to create system directory sunrpc May 10 00:37:43.187999 kernel: Failed to create system directory sunrpc May 10 00:37:43.188013 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.189498 kernel: Failed to create system directory sunrpc May 10 00:37:43.189533 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.190949 kernel: Failed to create system directory sunrpc May 10 00:37:43.191001 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.192426 kernel: Failed to create system directory sunrpc May 10 00:37:43.192458 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.193905 kernel: Failed to create system directory sunrpc May 10 00:37:43.193950 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.195402 kernel: Failed to create system directory sunrpc May 10 00:37:43.195448 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.196861 kernel: Failed to create system directory sunrpc May 10 00:37:43.196887 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.198375 kernel: Failed to create system directory sunrpc May 10 00:37:43.198471 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.199954 kernel: Failed to create system directory sunrpc May 10 00:37:43.199986 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.201422 kernel: Failed to create system directory sunrpc May 10 00:37:43.201458 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.202888 kernel: Failed to create system directory sunrpc May 10 00:37:43.202930 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.203615 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.205273 kernel: Failed to create system directory sunrpc May 10 00:37:43.205323 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.206891 kernel: Failed to create system directory sunrpc May 10 00:37:43.206943 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.207765 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.209974 kernel: Failed to create system directory sunrpc May 10 00:37:43.210022 kernel: Failed to create system directory sunrpc May 10 00:37:43.210053 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.211655 kernel: Failed to create system directory sunrpc May 10 00:37:43.211713 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.213447 kernel: Failed to create system directory sunrpc May 10 00:37:43.213533 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.214967 kernel: Failed to create system directory sunrpc May 10 00:37:43.215007 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.216561 kernel: Failed to create system directory sunrpc May 10 00:37:43.216623 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.218834 kernel: Failed to create system directory sunrpc May 10 00:37:43.218863 kernel: Failed to create system directory sunrpc May 10 00:37:43.218886 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.220398 kernel: Failed to create system directory sunrpc May 10 00:37:43.220496 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.221975 kernel: Failed to create system directory sunrpc May 10 00:37:43.222009 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.222802 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.224288 kernel: Failed to create system directory sunrpc May 10 00:37:43.224330 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.225873 kernel: Failed to create system directory sunrpc May 10 00:37:43.225909 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.227419 kernel: Failed to create system directory sunrpc May 10 00:37:43.227468 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.228934 kernel: Failed to create system directory sunrpc May 10 00:37:43.228972 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.230491 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.231291 kernel: Failed to create system directory sunrpc May 10 00:37:43.231362 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.232855 kernel: Failed to create system directory sunrpc May 10 00:37:43.232896 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.234383 kernel: Failed to create system directory sunrpc May 10 00:37:43.234417 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.235922 kernel: Failed to create system directory sunrpc May 10 00:37:43.235965 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.237462 kernel: Failed to create system directory sunrpc May 10 00:37:43.237504 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.238976 kernel: Failed to create system directory sunrpc May 10 00:37:43.238998 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.240604 kernel: Failed to create system directory sunrpc May 10 00:37:43.240624 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.242919 kernel: Failed to create system directory sunrpc May 10 00:37:43.242944 kernel: Failed to create system directory sunrpc May 10 00:37:43.242958 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.244382 kernel: Failed to create system directory sunrpc May 10 00:37:43.244407 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.245867 kernel: Failed to create system directory sunrpc May 10 00:37:43.245897 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.247335 kernel: Failed to create system directory sunrpc May 10 00:37:43.247362 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.248901 kernel: Failed to create system directory sunrpc May 10 00:37:43.248929 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.250427 kernel: Failed to create system directory sunrpc May 10 00:37:43.250462 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.251934 kernel: Failed to create system directory sunrpc May 10 00:37:43.251965 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.253398 kernel: Failed to create system directory sunrpc May 10 00:37:43.253418 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.254873 kernel: Failed to create system directory sunrpc May 10 00:37:43.254910 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.256369 kernel: Failed to create system directory sunrpc May 10 00:37:43.256410 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.257866 kernel: Failed to create system directory sunrpc May 10 00:37:43.257901 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.259417 kernel: Failed to create system directory sunrpc May 10 00:37:43.259438 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.260975 kernel: Failed to create system directory sunrpc May 10 00:37:43.261033 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.262539 kernel: Failed to create system directory sunrpc May 10 00:37:43.262572 kernel: Failed to create system directory sunrpc May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.156000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.265024 kernel: Failed to create system directory sunrpc May 10 00:37:43.265065 kernel: Failed to create system directory sunrpc May 10 00:37:43.275568 kernel: RPC: Registered named UNIX socket transport module. May 10 00:37:43.275741 kernel: RPC: Registered udp transport module. May 10 00:37:43.275762 kernel: RPC: Registered tcp transport module. May 10 00:37:43.277266 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 00:37:43.156000 audit[3097]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594f2c8bad0 a1=1a814c a2=5594c46b92b0 a3=5 items=6 ppid=62 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.156000 audit: CWD cwd="/" May 10 00:37:43.156000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PATH item=1 name=(null) inode=23290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PATH item=2 name=(null) inode=23290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PATH item=3 name=(null) inode=23291 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PATH item=4 name=(null) inode=23290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PATH item=5 name=(null) inode=23292 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:37:43.156000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.332441 kernel: Failed to create system directory nfs May 10 00:37:43.332502 kernel: Failed to create system directory nfs May 10 00:37:43.332524 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.333893 kernel: Failed to create system directory nfs May 10 00:37:43.333932 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.335378 kernel: Failed to create system directory nfs May 10 00:37:43.335407 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.336894 kernel: Failed to create system directory nfs May 10 00:37:43.336939 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.338378 kernel: Failed to create system directory nfs May 10 00:37:43.338408 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.339849 kernel: Failed to create system directory nfs May 10 00:37:43.339884 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.341271 kernel: Failed to create system directory nfs May 10 00:37:43.341305 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.342691 kernel: Failed to create system directory nfs May 10 00:37:43.342728 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.344843 kernel: Failed to create system directory nfs May 10 00:37:43.344898 kernel: Failed to create system directory nfs May 10 00:37:43.344916 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.346343 kernel: Failed to create system directory nfs May 10 00:37:43.346381 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.347767 kernel: Failed to create system directory nfs May 10 00:37:43.347804 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.349907 kernel: Failed to create system directory nfs May 10 00:37:43.349974 kernel: Failed to create system directory nfs May 10 00:37:43.350006 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.351402 kernel: Failed to create system directory nfs May 10 00:37:43.351442 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.352892 kernel: Failed to create system directory nfs May 10 00:37:43.352930 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.354333 kernel: Failed to create system directory nfs May 10 00:37:43.354362 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.355812 kernel: Failed to create system directory nfs May 10 00:37:43.355842 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.357348 kernel: Failed to create system directory nfs May 10 00:37:43.357403 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.358835 kernel: Failed to create system directory nfs May 10 00:37:43.358882 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.360349 kernel: Failed to create system directory nfs May 10 00:37:43.360392 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.361908 kernel: Failed to create system directory nfs May 10 00:37:43.361946 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.363469 kernel: Failed to create system directory nfs May 10 00:37:43.363528 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.365000 kernel: Failed to create system directory nfs May 10 00:37:43.365034 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.366517 kernel: Failed to create system directory nfs May 10 00:37:43.366576 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.368813 kernel: Failed to create system directory nfs May 10 00:37:43.368850 kernel: Failed to create system directory nfs May 10 00:37:43.368879 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.370324 kernel: Failed to create system directory nfs May 10 00:37:43.370369 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.371748 kernel: Failed to create system directory nfs May 10 00:37:43.371781 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.373918 kernel: Failed to create system directory nfs May 10 00:37:43.373955 kernel: Failed to create system directory nfs May 10 00:37:43.373978 kernel: Failed to create system directory nfs May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.322000 audit[3097]: AVC avc: denied { confidentiality } for pid=3097 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.375360 kernel: Failed to create system directory nfs May 10 00:37:43.396888 kubelet[1444]: E0510 00:37:43.396731 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:43.397292 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 00:37:43.322000 audit[3097]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594f2eaca10 a1=16eae4 a2=5594c46b92b0 a3=5 items=0 ppid=62 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.322000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.438274 kernel: Failed to create system directory nfs4 May 10 00:37:43.438334 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.440796 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.442400 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.443935 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.445083 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.445927 kernel: Failed to create system directory nfs4 May 10 00:37:43.445994 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.446661 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.447383 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.448783 kernel: Failed to create system directory nfs4 May 10 00:37:43.448818 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.450306 kernel: Failed to create system directory nfs4 May 10 00:37:43.450344 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.451848 kernel: Failed to create system directory nfs4 May 10 00:37:43.451908 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.453352 kernel: Failed to create system directory nfs4 May 10 00:37:43.453404 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.454846 kernel: Failed to create system directory nfs4 May 10 00:37:43.454890 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.456353 kernel: Failed to create system directory nfs4 May 10 00:37:43.456406 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.457876 kernel: Failed to create system directory nfs4 May 10 00:37:43.457919 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.459480 kernel: Failed to create system directory nfs4 May 10 00:37:43.459507 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.461841 kernel: Failed to create system directory nfs4 May 10 00:37:43.461900 kernel: Failed to create system directory nfs4 May 10 00:37:43.461936 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.463547 kernel: Failed to create system directory nfs4 May 10 00:37:43.463581 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.465278 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.466932 kernel: Failed to create system directory nfs4 May 10 00:37:43.466964 kernel: Failed to create system directory nfs4 May 10 00:37:43.466979 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.468437 kernel: Failed to create system directory nfs4 May 10 00:37:43.468504 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.469937 kernel: Failed to create system directory nfs4 May 10 00:37:43.469973 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.471403 kernel: Failed to create system directory nfs4 May 10 00:37:43.471439 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.472982 kernel: Failed to create system directory nfs4 May 10 00:37:43.473031 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.474491 kernel: Failed to create system directory nfs4 May 10 00:37:43.474512 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.475940 kernel: Failed to create system directory nfs4 May 10 00:37:43.475963 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.477499 kernel: Failed to create system directory nfs4 May 10 00:37:43.477542 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.478272 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.479832 kernel: Failed to create system directory nfs4 May 10 00:37:43.479875 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.481426 kernel: Failed to create system directory nfs4 May 10 00:37:43.481460 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.482940 kernel: Failed to create system directory nfs4 May 10 00:37:43.482972 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.484534 kernel: Failed to create system directory nfs4 May 10 00:37:43.484574 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.486839 kernel: Failed to create system directory nfs4 May 10 00:37:43.486881 kernel: Failed to create system directory nfs4 May 10 00:37:43.486902 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.488381 kernel: Failed to create system directory nfs4 May 10 00:37:43.488421 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.489917 kernel: Failed to create system directory nfs4 May 10 00:37:43.489958 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.491538 kernel: Failed to create system directory nfs4 May 10 00:37:43.491581 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.493825 kernel: Failed to create system directory nfs4 May 10 00:37:43.493874 kernel: Failed to create system directory nfs4 May 10 00:37:43.493898 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.495385 kernel: Failed to create system directory nfs4 May 10 00:37:43.495425 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.496846 kernel: Failed to create system directory nfs4 May 10 00:37:43.496905 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.498339 kernel: Failed to create system directory nfs4 May 10 00:37:43.498396 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.499907 kernel: Failed to create system directory nfs4 May 10 00:37:43.499976 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.501479 kernel: Failed to create system directory nfs4 May 10 00:37:43.501519 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.502975 kernel: Failed to create system directory nfs4 May 10 00:37:43.503014 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.504528 kernel: Failed to create system directory nfs4 May 10 00:37:43.504582 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.506788 kernel: Failed to create system directory nfs4 May 10 00:37:43.506828 kernel: Failed to create system directory nfs4 May 10 00:37:43.506861 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.508321 kernel: Failed to create system directory nfs4 May 10 00:37:43.508352 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.509858 kernel: Failed to create system directory nfs4 May 10 00:37:43.509893 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.511402 kernel: Failed to create system directory nfs4 May 10 00:37:43.511447 kernel: Failed to create system directory nfs4 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.425000 audit[3102]: AVC avc: denied { confidentiality } for pid=3102 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.512893 kernel: Failed to create system directory nfs4 May 10 00:37:43.664684 kernel: NFS: Registering the id_resolver key type May 10 00:37:43.664839 kernel: Key type id_resolver registered May 10 00:37:43.664901 kernel: Key type id_legacy registered May 10 00:37:43.425000 audit[3102]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7435ccd010 a1=209404 a2=559a6e18a2b0 a3=5 items=0 ppid=62 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.425000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.678706 kernel: Failed to create system directory rpcgss May 10 00:37:43.678785 kernel: Failed to create system directory rpcgss May 10 00:37:43.678812 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.680359 kernel: Failed to create system directory rpcgss May 10 00:37:43.680389 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.681950 kernel: Failed to create system directory rpcgss May 10 00:37:43.682011 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.683577 kernel: Failed to create system directory rpcgss May 10 00:37:43.683625 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.686014 kernel: Failed to create system directory rpcgss May 10 00:37:43.686070 kernel: Failed to create system directory rpcgss May 10 00:37:43.686091 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.687602 kernel: Failed to create system directory rpcgss May 10 00:37:43.687654 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.689769 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.691316 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.692604 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.693479 kernel: Failed to create system directory rpcgss May 10 00:37:43.693527 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.695760 kernel: Failed to create system directory rpcgss May 10 00:37:43.695807 kernel: Failed to create system directory rpcgss May 10 00:37:43.695830 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.697271 kernel: Failed to create system directory rpcgss May 10 00:37:43.697309 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.698802 kernel: Failed to create system directory rpcgss May 10 00:37:43.698847 kernel: Failed to create system directory rpcgss May 10 00:37:43.673000 audit[3103]: AVC avc: denied { confidentiality } for pid=3103 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:37:43.673000 audit[3103]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7b7ca1c010 a1=70b64 a2=5606142112b0 a3=5 items=0 ppid=62 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.673000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 00:37:43.717369 nfsidmap[3112]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 10 00:37:43.720428 nfsidmap[3115]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 10 00:37:43.726000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.726000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564240eb9400 a2=10 a3=d3695051b2ffddd items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:37:43.726000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.726000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564240eb9400 a2=10 a3=d3695051b2ffddd items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:37:43.726000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.726000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564240eb9400 a2=10 a3=d3695051b2ffddd items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:37:43.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:37:43.805299 env[1207]: time="2025-05-10T00:37:43.805213484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f5ffb1f0-9e6a-4dc2-b665-297d08cefddf,Namespace:default,Attempt:0,}" May 10 00:37:43.916641 systemd-networkd[1022]: cali5ec59c6bf6e: Link UP May 10 00:37:43.919301 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:37:43.919415 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 00:37:43.919281 systemd-networkd[1022]: cali5ec59c6bf6e: Gained carrier May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.849 [INFO][3118] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.27-k8s-test--pod--1-eth0 default f5ffb1f0-9e6a-4dc2-b665-297d08cefddf 1247 0 2025-05-10 00:37:26 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.27 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.849 [INFO][3118] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.875 [INFO][3132] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" HandleID="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Workload="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.885 [INFO][3132] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" HandleID="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Workload="10.0.0.27-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003aed90), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.27", "pod":"test-pod-1", "timestamp":"2025-05-10 00:37:43.875402459 +0000 UTC"}, Hostname:"10.0.0.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.885 [INFO][3132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.885 [INFO][3132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.885 [INFO][3132] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.27' May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.887 [INFO][3132] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.891 [INFO][3132] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.895 [INFO][3132] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.896 [INFO][3132] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.898 [INFO][3132] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.898 [INFO][3132] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.900 [INFO][3132] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928 May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.903 [INFO][3132] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.911 [INFO][3132] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.68/26] block=192.168.94.64/26 handle="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.911 [INFO][3132] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.68/26] handle="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" host="10.0.0.27" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.911 [INFO][3132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.911 [INFO][3132] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.68/26] IPv6=[] ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" HandleID="k8s-pod-network.997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Workload="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.927770 env[1207]: 2025-05-10 00:37:43.912 [INFO][3118] cni-plugin/k8s.go 386: Populated endpoint ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f5ffb1f0-9e6a-4dc2-b665-297d08cefddf", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 37, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:43.928448 env[1207]: 2025-05-10 00:37:43.913 [INFO][3118] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.68/32] ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.928448 env[1207]: 2025-05-10 00:37:43.913 [INFO][3118] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.928448 env[1207]: 2025-05-10 00:37:43.919 [INFO][3118] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.928448 env[1207]: 2025-05-10 00:37:43.919 [INFO][3118] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f5ffb1f0-9e6a-4dc2-b665-297d08cefddf", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 37, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.27", ContainerID:"997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1a:2b:05:73:ae:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:43.928448 env[1207]: 2025-05-10 00:37:43.926 [INFO][3118] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.27-k8s-test--pod--1-eth0" May 10 00:37:43.937000 audit[3162]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:37:43.937000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc57a581d0 a2=0 a3=7ffc57a581bc items=0 ppid=2178 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:37:43.939081 env[1207]: time="2025-05-10T00:37:43.938978640Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:37:43.939081 env[1207]: time="2025-05-10T00:37:43.939049533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:37:43.939153 env[1207]: time="2025-05-10T00:37:43.939064501Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:37:43.939341 env[1207]: time="2025-05-10T00:37:43.939300415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928 pid=3163 runtime=io.containerd.runc.v2 May 10 00:37:43.950900 systemd[1]: Started cri-containerd-997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928.scope. May 10 00:37:43.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit: BPF prog-id=126 op=LOAD May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3163 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939376661323463623930323761333961636337366461343263623430 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3163 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939376661323463623930323761333961636337366461343263623430 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit: BPF prog-id=127 op=LOAD May 10 00:37:43.963000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000a8f00 items=0 ppid=3163 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939376661323463623930323761333961636337366461343263623430 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit: BPF prog-id=128 op=LOAD May 10 00:37:43.963000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0000a8f48 items=0 ppid=3163 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939376661323463623930323761333961636337366461343263623430 May 10 00:37:43.963000 audit: BPF prog-id=128 op=UNLOAD May 10 00:37:43.963000 audit: BPF prog-id=127 op=UNLOAD May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:43.963000 audit: BPF prog-id=129 op=LOAD May 10 00:37:43.963000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000a9358 items=0 ppid=3163 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939376661323463623930323761333961636337366461343263623430 May 10 00:37:43.965804 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:37:43.986803 env[1207]: time="2025-05-10T00:37:43.986738777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f5ffb1f0-9e6a-4dc2-b665-297d08cefddf,Namespace:default,Attempt:0,} returns sandbox id \"997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928\"" May 10 00:37:43.988178 env[1207]: time="2025-05-10T00:37:43.988152884Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:37:44.361365 env[1207]: time="2025-05-10T00:37:44.361312505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:44.363463 env[1207]: time="2025-05-10T00:37:44.363380259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:44.365542 env[1207]: time="2025-05-10T00:37:44.365507565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:44.367266 env[1207]: time="2025-05-10T00:37:44.367206868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:37:44.367943 env[1207]: time="2025-05-10T00:37:44.367907684Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:37:44.371684 env[1207]: time="2025-05-10T00:37:44.371644704Z" level=info msg="CreateContainer within sandbox \"997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 00:37:44.384872 env[1207]: time="2025-05-10T00:37:44.384819012Z" level=info msg="CreateContainer within sandbox \"997fa24cb9027a39acc76da42cb40070e7db7ab6eab44bd0d6353fbe9c7a6928\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"271442de065b327ac35401ebbb89bee18b923043353438b22c6bc79f59496cba\"" May 10 00:37:44.385521 env[1207]: time="2025-05-10T00:37:44.385448064Z" level=info msg="StartContainer for \"271442de065b327ac35401ebbb89bee18b923043353438b22c6bc79f59496cba\"" May 10 00:37:44.396929 kubelet[1444]: E0510 00:37:44.396866 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:44.404158 systemd[1]: Started cri-containerd-271442de065b327ac35401ebbb89bee18b923043353438b22c6bc79f59496cba.scope. May 10 00:37:44.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit: BPF prog-id=130 op=LOAD May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3163 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313434326465303635623332376163333534303165626262383962 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3163 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313434326465303635623332376163333534303165626262383962 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.415000 audit: BPF prog-id=131 op=LOAD May 10 00:37:44.415000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000241b20 items=0 ppid=3163 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313434326465303635623332376163333534303165626262383962 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit: BPF prog-id=132 op=LOAD May 10 00:37:44.416000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000241b68 items=0 ppid=3163 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:44.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313434326465303635623332376163333534303165626262383962 May 10 00:37:44.416000 audit: BPF prog-id=132 op=UNLOAD May 10 00:37:44.416000 audit: BPF prog-id=131 op=UNLOAD May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:37:44.416000 audit: BPF prog-id=133 op=LOAD May 10 00:37:44.416000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000241f78 items=0 ppid=3163 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:44.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313434326465303635623332376163333534303165626262383962 May 10 00:37:44.434548 env[1207]: time="2025-05-10T00:37:44.433702631Z" level=info msg="StartContainer for \"271442de065b327ac35401ebbb89bee18b923043353438b22c6bc79f59496cba\" returns successfully" May 10 00:37:45.228184 kubelet[1444]: I0510 00:37:45.228117 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.846773402 podStartE2EDuration="19.228096929s" podCreationTimestamp="2025-05-10 00:37:26 +0000 UTC" firstStartedPulling="2025-05-10 00:37:43.987788459 +0000 UTC m=+69.139237767" lastFinishedPulling="2025-05-10 00:37:44.369111986 +0000 UTC m=+69.520561294" observedRunningTime="2025-05-10 00:37:45.227817785 +0000 UTC m=+70.379267103" watchObservedRunningTime="2025-05-10 00:37:45.228096929 +0000 UTC m=+70.379546237" May 10 00:37:45.304465 systemd-networkd[1022]: cali5ec59c6bf6e: Gained IPv6LL May 10 00:37:45.397444 kubelet[1444]: E0510 00:37:45.397370 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:46.397583 kubelet[1444]: E0510 00:37:46.397519 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:47.398045 kubelet[1444]: E0510 00:37:47.397988 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:48.398877 kubelet[1444]: E0510 00:37:48.398810 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:37:49.399641 kubelet[1444]: E0510 00:37:49.399557 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"