May 13 00:39:03.941943 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:39:03.941962 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:39:03.941970 kernel: BIOS-provided physical RAM map: May 13 00:39:03.941976 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 00:39:03.941981 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 00:39:03.941986 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 00:39:03.941993 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 13 00:39:03.941998 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 13 00:39:03.942005 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:39:03.942010 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 13 00:39:03.942015 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 00:39:03.942021 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 00:39:03.942026 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 00:39:03.942031 kernel: NX (Execute Disable) protection: active May 13 00:39:03.942053 kernel: SMBIOS 2.8 present. May 13 00:39:03.942061 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 13 00:39:03.942068 kernel: Hypervisor detected: KVM May 13 00:39:03.942076 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:39:03.942087 kernel: kvm-clock: cpu 0, msr 6b196001, primary cpu clock May 13 00:39:03.942095 kernel: kvm-clock: using sched offset of 2820032766 cycles May 13 00:39:03.942104 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:39:03.942112 kernel: tsc: Detected 2794.746 MHz processor May 13 00:39:03.942121 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:39:03.942132 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:39:03.942141 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 13 00:39:03.942149 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:39:03.942157 kernel: Using GB pages for direct mapping May 13 00:39:03.942166 kernel: ACPI: Early table checksum verification disabled May 13 00:39:03.942174 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 13 00:39:03.942183 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942191 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942200 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942210 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 13 00:39:03.942219 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942227 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942235 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942244 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:39:03.942252 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 13 00:39:03.942260 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 13 00:39:03.942269 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 13 00:39:03.942282 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 13 00:39:03.942291 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 13 00:39:03.942300 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 13 00:39:03.942309 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 13 00:39:03.942318 kernel: No NUMA configuration found May 13 00:39:03.942328 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 13 00:39:03.942338 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 13 00:39:03.942347 kernel: Zone ranges: May 13 00:39:03.942357 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:39:03.942366 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 13 00:39:03.942375 kernel: Normal empty May 13 00:39:03.942385 kernel: Movable zone start for each node May 13 00:39:03.942394 kernel: Early memory node ranges May 13 00:39:03.942403 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 00:39:03.942413 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 13 00:39:03.942424 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 13 00:39:03.942433 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:39:03.942442 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 00:39:03.942452 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 13 00:39:03.942460 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:39:03.942469 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:39:03.942478 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:39:03.942487 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:39:03.942496 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:39:03.942505 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:39:03.942521 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:39:03.942531 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:39:03.942540 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:39:03.942549 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:39:03.942559 kernel: TSC deadline timer available May 13 00:39:03.942568 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:39:03.942577 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:39:03.942586 kernel: kvm-guest: setup PV sched yield May 13 00:39:03.942595 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 13 00:39:03.942607 kernel: Booting paravirtualized kernel on KVM May 13 00:39:03.942616 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:39:03.942626 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:39:03.942635 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:39:03.942645 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:39:03.942654 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:39:03.942662 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:39:03.942671 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 13 00:39:03.942679 kernel: kvm-guest: PV spinlocks enabled May 13 00:39:03.942690 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:39:03.942698 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 13 00:39:03.942707 kernel: Policy zone: DMA32 May 13 00:39:03.942717 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:39:03.942727 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:39:03.942736 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:39:03.942744 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:39:03.942753 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:39:03.942764 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 13 00:39:03.942773 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:39:03.942782 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:39:03.942790 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:39:03.942799 kernel: rcu: Hierarchical RCU implementation. May 13 00:39:03.942816 kernel: rcu: RCU event tracing is enabled. May 13 00:39:03.942825 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:39:03.942834 kernel: Rude variant of Tasks RCU enabled. May 13 00:39:03.942843 kernel: Tracing variant of Tasks RCU enabled. May 13 00:39:03.942854 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:39:03.942863 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:39:03.942872 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:39:03.942881 kernel: random: crng init done May 13 00:39:03.942889 kernel: Console: colour VGA+ 80x25 May 13 00:39:03.942898 kernel: printk: console [ttyS0] enabled May 13 00:39:03.942907 kernel: ACPI: Core revision 20210730 May 13 00:39:03.942916 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:39:03.942925 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:39:03.942935 kernel: x2apic enabled May 13 00:39:03.942943 kernel: Switched APIC routing to physical x2apic. May 13 00:39:03.942956 kernel: kvm-guest: setup PV IPIs May 13 00:39:03.942965 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:39:03.942974 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:39:03.942984 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 13 00:39:03.942993 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:39:03.943003 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:39:03.943013 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:39:03.943030 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:39:03.943059 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:39:03.943069 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:39:03.943081 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:39:03.943091 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:39:03.943101 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:39:03.943111 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:39:03.943121 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:39:03.943131 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:39:03.943142 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:39:03.943152 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:39:03.943162 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:39:03.943171 kernel: Freeing SMP alternatives memory: 32K May 13 00:39:03.943180 kernel: pid_max: default: 32768 minimum: 301 May 13 00:39:03.943190 kernel: LSM: Security Framework initializing May 13 00:39:03.943199 kernel: SELinux: Initializing. May 13 00:39:03.943208 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:39:03.943219 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:39:03.943228 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:39:03.943238 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:39:03.943247 kernel: ... version: 0 May 13 00:39:03.943256 kernel: ... bit width: 48 May 13 00:39:03.943265 kernel: ... generic registers: 6 May 13 00:39:03.943274 kernel: ... value mask: 0000ffffffffffff May 13 00:39:03.943283 kernel: ... max period: 00007fffffffffff May 13 00:39:03.943293 kernel: ... fixed-purpose events: 0 May 13 00:39:03.943303 kernel: ... event mask: 000000000000003f May 13 00:39:03.943312 kernel: signal: max sigframe size: 1776 May 13 00:39:03.943321 kernel: rcu: Hierarchical SRCU implementation. May 13 00:39:03.943331 kernel: smp: Bringing up secondary CPUs ... May 13 00:39:03.943342 kernel: x86: Booting SMP configuration: May 13 00:39:03.943353 kernel: .... node #0, CPUs: #1 May 13 00:39:03.943363 kernel: kvm-clock: cpu 1, msr 6b196041, secondary cpu clock May 13 00:39:03.943372 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:39:03.943382 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 13 00:39:03.943393 kernel: #2 May 13 00:39:03.943403 kernel: kvm-clock: cpu 2, msr 6b196081, secondary cpu clock May 13 00:39:03.943413 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:39:03.943422 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 13 00:39:03.943432 kernel: #3 May 13 00:39:03.943446 kernel: kvm-clock: cpu 3, msr 6b1960c1, secondary cpu clock May 13 00:39:03.943456 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:39:03.943466 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 13 00:39:03.943476 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:39:03.943487 kernel: smpboot: Max logical packages: 1 May 13 00:39:03.943497 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 13 00:39:03.943507 kernel: devtmpfs: initialized May 13 00:39:03.943516 kernel: x86/mm: Memory block size: 128MB May 13 00:39:03.943527 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:39:03.943536 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:39:03.943545 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:39:03.943555 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:39:03.943564 kernel: audit: initializing netlink subsys (disabled) May 13 00:39:03.943575 kernel: audit: type=2000 audit(1747096743.032:1): state=initialized audit_enabled=0 res=1 May 13 00:39:03.943584 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:39:03.943594 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:39:03.943604 kernel: cpuidle: using governor menu May 13 00:39:03.943613 kernel: ACPI: bus type PCI registered May 13 00:39:03.943623 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:39:03.943633 kernel: dca service started, version 1.12.1 May 13 00:39:03.943643 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:39:03.943653 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:39:03.943664 kernel: PCI: Using configuration type 1 for base access May 13 00:39:03.943674 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:39:03.943684 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:39:03.943694 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:39:03.943704 kernel: ACPI: Added _OSI(Module Device) May 13 00:39:03.943713 kernel: ACPI: Added _OSI(Processor Device) May 13 00:39:03.943723 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:39:03.943733 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:39:03.943743 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:39:03.943753 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:39:03.943763 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:39:03.943773 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:39:03.943782 kernel: ACPI: Interpreter enabled May 13 00:39:03.943792 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:39:03.943801 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:39:03.943820 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:39:03.943830 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:39:03.943840 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:39:03.943993 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:39:03.944135 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:39:03.944231 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:39:03.944245 kernel: PCI host bridge to bus 0000:00 May 13 00:39:03.944346 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:39:03.944433 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:39:03.944525 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:39:03.944643 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:39:03.944730 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:39:03.944826 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 13 00:39:03.944914 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:39:03.945025 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:39:03.945148 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:39:03.945252 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 13 00:39:03.945349 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 13 00:39:03.945448 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 13 00:39:03.945545 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:39:03.945651 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:39:03.945749 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 13 00:39:03.945863 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 13 00:39:03.945970 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 13 00:39:03.946116 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:39:03.946248 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 13 00:39:03.946341 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 13 00:39:03.946456 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 13 00:39:03.946580 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:39:03.946675 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 13 00:39:03.946767 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 13 00:39:03.946866 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 13 00:39:03.946961 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 13 00:39:03.947105 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:39:03.947208 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:39:03.947311 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:39:03.947407 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 13 00:39:03.947507 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 13 00:39:03.947611 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:39:03.947710 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 13 00:39:03.947724 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:39:03.947734 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:39:03.947744 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:39:03.947753 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:39:03.947766 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:39:03.947775 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:39:03.947785 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:39:03.947795 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:39:03.947815 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:39:03.947825 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:39:03.947835 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:39:03.947845 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:39:03.947854 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:39:03.947866 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:39:03.947876 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:39:03.947886 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:39:03.947896 kernel: iommu: Default domain type: Translated May 13 00:39:03.947905 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:39:03.948007 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:39:03.948146 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:39:03.948241 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:39:03.948255 kernel: vgaarb: loaded May 13 00:39:03.948269 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:39:03.948279 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:39:03.948289 kernel: PTP clock support registered May 13 00:39:03.948298 kernel: PCI: Using ACPI for IRQ routing May 13 00:39:03.948308 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:39:03.948318 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 00:39:03.948328 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 13 00:39:03.948338 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:39:03.948348 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:39:03.948359 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:39:03.948368 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:39:03.948378 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:39:03.948387 kernel: pnp: PnP ACPI init May 13 00:39:03.948514 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:39:03.948531 kernel: pnp: PnP ACPI: found 6 devices May 13 00:39:03.948541 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:39:03.948551 kernel: NET: Registered PF_INET protocol family May 13 00:39:03.948564 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:39:03.948573 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:39:03.948589 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:39:03.948599 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:39:03.948609 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:39:03.948618 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:39:03.948628 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:39:03.948637 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:39:03.948649 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:39:03.948658 kernel: NET: Registered PF_XDP protocol family May 13 00:39:03.948749 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:39:03.948845 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:39:03.948913 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:39:03.948971 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:39:03.949029 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:39:03.949102 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 13 00:39:03.949111 kernel: PCI: CLS 0 bytes, default 64 May 13 00:39:03.949121 kernel: Initialise system trusted keyrings May 13 00:39:03.949128 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:39:03.949135 kernel: Key type asymmetric registered May 13 00:39:03.949141 kernel: Asymmetric key parser 'x509' registered May 13 00:39:03.949148 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:39:03.949154 kernel: io scheduler mq-deadline registered May 13 00:39:03.949161 kernel: io scheduler kyber registered May 13 00:39:03.949168 kernel: io scheduler bfq registered May 13 00:39:03.949175 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:39:03.949183 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:39:03.949190 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:39:03.949197 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:39:03.949203 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:39:03.949210 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:39:03.949218 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:39:03.949224 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:39:03.949231 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:39:03.949300 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:39:03.949312 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:39:03.949376 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:39:03.949436 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:39:03 UTC (1747096743) May 13 00:39:03.949496 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:39:03.949505 kernel: NET: Registered PF_INET6 protocol family May 13 00:39:03.949512 kernel: Segment Routing with IPv6 May 13 00:39:03.949519 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:39:03.949526 kernel: NET: Registered PF_PACKET protocol family May 13 00:39:03.949534 kernel: Key type dns_resolver registered May 13 00:39:03.949541 kernel: IPI shorthand broadcast: enabled May 13 00:39:03.949548 kernel: sched_clock: Marking stable (405248627, 116709930)->(577296966, -55338409) May 13 00:39:03.949554 kernel: registered taskstats version 1 May 13 00:39:03.949561 kernel: Loading compiled-in X.509 certificates May 13 00:39:03.949568 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:39:03.949575 kernel: Key type .fscrypt registered May 13 00:39:03.949581 kernel: Key type fscrypt-provisioning registered May 13 00:39:03.949588 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:39:03.949596 kernel: ima: Allocated hash algorithm: sha1 May 13 00:39:03.949603 kernel: ima: No architecture policies found May 13 00:39:03.949609 kernel: clk: Disabling unused clocks May 13 00:39:03.949616 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:39:03.949623 kernel: Write protecting the kernel read-only data: 28672k May 13 00:39:03.949629 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:39:03.949636 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:39:03.949643 kernel: Run /init as init process May 13 00:39:03.949649 kernel: with arguments: May 13 00:39:03.949657 kernel: /init May 13 00:39:03.949664 kernel: with environment: May 13 00:39:03.949670 kernel: HOME=/ May 13 00:39:03.949677 kernel: TERM=linux May 13 00:39:03.949683 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:39:03.949692 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:39:03.949701 systemd[1]: Detected virtualization kvm. May 13 00:39:03.949708 systemd[1]: Detected architecture x86-64. May 13 00:39:03.949717 systemd[1]: Running in initrd. May 13 00:39:03.949724 systemd[1]: No hostname configured, using default hostname. May 13 00:39:03.949730 systemd[1]: Hostname set to . May 13 00:39:03.949738 systemd[1]: Initializing machine ID from VM UUID. May 13 00:39:03.949745 systemd[1]: Queued start job for default target initrd.target. May 13 00:39:03.949752 systemd[1]: Started systemd-ask-password-console.path. May 13 00:39:03.949759 systemd[1]: Reached target cryptsetup.target. May 13 00:39:03.949766 systemd[1]: Reached target paths.target. May 13 00:39:03.949775 systemd[1]: Reached target slices.target. May 13 00:39:03.949787 systemd[1]: Reached target swap.target. May 13 00:39:03.949796 systemd[1]: Reached target timers.target. May 13 00:39:03.949803 systemd[1]: Listening on iscsid.socket. May 13 00:39:03.949823 systemd[1]: Listening on iscsiuio.socket. May 13 00:39:03.949835 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:39:03.949845 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:39:03.949854 systemd[1]: Listening on systemd-journald.socket. May 13 00:39:03.949864 systemd[1]: Listening on systemd-networkd.socket. May 13 00:39:03.949872 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:39:03.949880 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:39:03.949887 systemd[1]: Reached target sockets.target. May 13 00:39:03.949894 systemd[1]: Starting kmod-static-nodes.service... May 13 00:39:03.949902 systemd[1]: Finished network-cleanup.service. May 13 00:39:03.949910 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:39:03.949918 systemd[1]: Starting systemd-journald.service... May 13 00:39:03.949925 systemd[1]: Starting systemd-modules-load.service... May 13 00:39:03.949933 systemd[1]: Starting systemd-resolved.service... May 13 00:39:03.949940 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:39:03.949947 systemd[1]: Finished kmod-static-nodes.service. May 13 00:39:03.949954 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:39:03.949962 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:39:03.949969 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:39:03.949981 systemd-journald[199]: Journal started May 13 00:39:03.950017 systemd-journald[199]: Runtime Journal (/run/log/journal/24bfc2e6cb6d42279c7ea482013bdeaf) is 6.0M, max 48.5M, 42.5M free. May 13 00:39:03.939736 systemd-modules-load[200]: Inserted module 'overlay' May 13 00:39:03.994966 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:39:03.994988 kernel: Bridge firewalling registered May 13 00:39:03.994997 systemd[1]: Started systemd-journald.service. May 13 00:39:03.995008 kernel: audit: type=1130 audit(1747096743.976:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.995018 kernel: audit: type=1130 audit(1747096743.982:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.995029 kernel: audit: type=1130 audit(1747096743.985:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.995052 kernel: audit: type=1130 audit(1747096743.988:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:03.960785 systemd-resolved[201]: Positive Trust Anchors: May 13 00:39:03.960792 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:39:03.960827 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:39:03.962888 systemd-resolved[201]: Defaulting to hostname 'linux'. May 13 00:39:03.982050 systemd-modules-load[200]: Inserted module 'br_netfilter' May 13 00:39:03.982496 systemd[1]: Started systemd-resolved.service. May 13 00:39:03.985886 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:39:03.988990 systemd[1]: Reached target nss-lookup.target. May 13 00:39:03.992935 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:39:04.007812 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:39:04.014506 kernel: audit: type=1130 audit(1747096744.009:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.014537 kernel: SCSI subsystem initialized May 13 00:39:04.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.010001 systemd[1]: Starting dracut-cmdline.service... May 13 00:39:04.019474 dracut-cmdline[215]: dracut-dracut-053 May 13 00:39:04.021658 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:39:04.029550 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:39:04.029589 kernel: device-mapper: uevent: version 1.0.3 May 13 00:39:04.030984 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:39:04.034283 systemd-modules-load[200]: Inserted module 'dm_multipath' May 13 00:39:04.034942 systemd[1]: Finished systemd-modules-load.service. May 13 00:39:04.039650 kernel: audit: type=1130 audit(1747096744.035:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.039168 systemd[1]: Starting systemd-sysctl.service... May 13 00:39:04.046458 systemd[1]: Finished systemd-sysctl.service. May 13 00:39:04.050602 kernel: audit: type=1130 audit(1747096744.046:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.089069 kernel: Loading iSCSI transport class v2.0-870. May 13 00:39:04.105077 kernel: iscsi: registered transport (tcp) May 13 00:39:04.127083 kernel: iscsi: registered transport (qla4xxx) May 13 00:39:04.127156 kernel: QLogic iSCSI HBA Driver May 13 00:39:04.158129 systemd[1]: Finished dracut-cmdline.service. May 13 00:39:04.164093 kernel: audit: type=1130 audit(1747096744.158:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.159235 systemd[1]: Starting dracut-pre-udev.service... May 13 00:39:04.206090 kernel: raid6: avx2x4 gen() 30610 MB/s May 13 00:39:04.223085 kernel: raid6: avx2x4 xor() 7840 MB/s May 13 00:39:04.240091 kernel: raid6: avx2x2 gen() 32109 MB/s May 13 00:39:04.257089 kernel: raid6: avx2x2 xor() 19180 MB/s May 13 00:39:04.274088 kernel: raid6: avx2x1 gen() 25022 MB/s May 13 00:39:04.291089 kernel: raid6: avx2x1 xor() 15144 MB/s May 13 00:39:04.308085 kernel: raid6: sse2x4 gen() 14668 MB/s May 13 00:39:04.325083 kernel: raid6: sse2x4 xor() 7324 MB/s May 13 00:39:04.342081 kernel: raid6: sse2x2 gen() 16352 MB/s May 13 00:39:04.359082 kernel: raid6: sse2x2 xor() 9807 MB/s May 13 00:39:04.376067 kernel: raid6: sse2x1 gen() 12342 MB/s May 13 00:39:04.393498 kernel: raid6: sse2x1 xor() 7649 MB/s May 13 00:39:04.393545 kernel: raid6: using algorithm avx2x2 gen() 32109 MB/s May 13 00:39:04.393558 kernel: raid6: .... xor() 19180 MB/s, rmw enabled May 13 00:39:04.394213 kernel: raid6: using avx2x2 recovery algorithm May 13 00:39:04.408081 kernel: xor: automatically using best checksumming function avx May 13 00:39:04.497086 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:39:04.505518 systemd[1]: Finished dracut-pre-udev.service. May 13 00:39:04.510369 kernel: audit: type=1130 audit(1747096744.506:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.510000 audit: BPF prog-id=7 op=LOAD May 13 00:39:04.510000 audit: BPF prog-id=8 op=LOAD May 13 00:39:04.510833 systemd[1]: Starting systemd-udevd.service... May 13 00:39:04.522974 systemd-udevd[398]: Using default interface naming scheme 'v252'. May 13 00:39:04.526739 systemd[1]: Started systemd-udevd.service. May 13 00:39:04.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.529068 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:39:04.540210 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 13 00:39:04.567703 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:39:04.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.570119 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:39:04.601828 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:39:04.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:04.632400 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:39:04.640872 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:39:04.640886 kernel: GPT:9289727 != 19775487 May 13 00:39:04.640898 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:39:04.640907 kernel: GPT:9289727 != 19775487 May 13 00:39:04.640916 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:39:04.640924 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:04.640933 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:39:04.648064 kernel: libata version 3.00 loaded. May 13 00:39:04.657077 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:39:04.662073 kernel: AES CTR mode by8 optimization enabled May 13 00:39:04.674747 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:39:04.696172 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:39:04.696190 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:39:04.696283 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:39:04.696359 kernel: scsi host0: ahci May 13 00:39:04.696450 kernel: scsi host1: ahci May 13 00:39:04.696532 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) May 13 00:39:04.696547 kernel: scsi host2: ahci May 13 00:39:04.696628 kernel: scsi host3: ahci May 13 00:39:04.696708 kernel: scsi host4: ahci May 13 00:39:04.696823 kernel: scsi host5: ahci May 13 00:39:04.696922 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 13 00:39:04.696934 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 13 00:39:04.696945 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 13 00:39:04.696959 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 13 00:39:04.696970 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 13 00:39:04.696980 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 13 00:39:04.688753 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:39:04.733039 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:39:04.740984 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:39:04.744295 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:39:04.748142 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:39:04.749935 systemd[1]: Starting disk-uuid.service... May 13 00:39:04.759845 disk-uuid[532]: Primary Header is updated. May 13 00:39:04.759845 disk-uuid[532]: Secondary Entries is updated. May 13 00:39:04.759845 disk-uuid[532]: Secondary Header is updated. May 13 00:39:04.763260 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:04.766058 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:04.769063 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:05.009842 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:39:05.009920 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:39:05.009938 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:39:05.009950 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:39:05.011071 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:39:05.012080 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:39:05.013081 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:39:05.014317 kernel: ata3.00: applying bridge limits May 13 00:39:05.015092 kernel: ata3.00: configured for UDMA/100 May 13 00:39:05.017058 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:39:05.049192 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:39:05.066818 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:39:05.066839 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:39:05.768902 disk-uuid[533]: The operation has completed successfully. May 13 00:39:05.770327 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:39:05.792237 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:39:05.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.792319 systemd[1]: Finished disk-uuid.service. May 13 00:39:05.799455 systemd[1]: Starting verity-setup.service... May 13 00:39:05.815072 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:39:05.835530 systemd[1]: Found device dev-mapper-usr.device. May 13 00:39:05.837452 systemd[1]: Mounting sysusr-usr.mount... May 13 00:39:05.839294 systemd[1]: Finished verity-setup.service. May 13 00:39:05.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.898642 systemd[1]: Mounted sysusr-usr.mount. May 13 00:39:05.900062 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:39:05.899355 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:39:05.900080 systemd[1]: Starting ignition-setup.service... May 13 00:39:05.900971 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:39:05.912437 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:39:05.912462 kernel: BTRFS info (device vda6): using free space tree May 13 00:39:05.912471 kernel: BTRFS info (device vda6): has skinny extents May 13 00:39:05.920655 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:39:05.928208 systemd[1]: Finished ignition-setup.service. May 13 00:39:05.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.929116 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:39:05.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.962078 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:39:05.964000 audit: BPF prog-id=9 op=LOAD May 13 00:39:05.964881 systemd[1]: Starting systemd-networkd.service... May 13 00:39:05.980379 ignition[666]: Ignition 2.14.0 May 13 00:39:05.980392 ignition[666]: Stage: fetch-offline May 13 00:39:05.980445 ignition[666]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:05.980456 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:05.980566 ignition[666]: parsed url from cmdline: "" May 13 00:39:05.980570 ignition[666]: no config URL provided May 13 00:39:05.980575 ignition[666]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:39:05.980583 ignition[666]: no config at "/usr/lib/ignition/user.ign" May 13 00:39:05.980602 ignition[666]: op(1): [started] loading QEMU firmware config module May 13 00:39:05.980607 ignition[666]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:39:05.987875 systemd-networkd[727]: lo: Link UP May 13 00:39:05.987879 systemd-networkd[727]: lo: Gained carrier May 13 00:39:05.988302 systemd-networkd[727]: Enumeration completed May 13 00:39:05.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:05.988415 systemd[1]: Started systemd-networkd.service. May 13 00:39:05.988494 systemd-networkd[727]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:39:05.994052 ignition[666]: op(1): [finished] loading QEMU firmware config module May 13 00:39:05.990142 systemd[1]: Reached target network.target. May 13 00:39:05.992312 systemd[1]: Starting iscsiuio.service... May 13 00:39:05.997148 ignition[666]: parsing config with SHA512: 7a075dbc4cde0fc40f37ec4bb28588c4dda3a5e92aa60d84fe083cb62ad037d54e1893aff76c607e40815dfaf8b68bb08e7e20007c8906d61c7c165200934c30 May 13 00:39:05.992521 systemd-networkd[727]: eth0: Link UP May 13 00:39:05.992524 systemd-networkd[727]: eth0: Gained carrier May 13 00:39:06.009533 systemd[1]: Started iscsiuio.service. May 13 00:39:06.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.011807 systemd[1]: Starting iscsid.service... May 13 00:39:06.014438 iscsid[734]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:39:06.014438 iscsid[734]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:39:06.014438 iscsid[734]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:39:06.014438 iscsid[734]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:39:06.014438 iscsid[734]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:39:06.014438 iscsid[734]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:39:06.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.015117 ignition[666]: fetch-offline: fetch-offline passed May 13 00:39:06.014604 unknown[666]: fetched base config from "system" May 13 00:39:06.015207 ignition[666]: Ignition finished successfully May 13 00:39:06.014627 unknown[666]: fetched user config from "qemu" May 13 00:39:06.015171 systemd-networkd[727]: eth0: DHCPv4 address 10.0.0.28/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:39:06.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.020236 systemd[1]: Started iscsid.service. May 13 00:39:06.037008 ignition[736]: Ignition 2.14.0 May 13 00:39:06.022110 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:39:06.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.037014 ignition[736]: Stage: kargs May 13 00:39:06.024429 systemd[1]: Starting dracut-initqueue.service... May 13 00:39:06.037113 ignition[736]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:06.025498 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:39:06.037121 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:06.026157 systemd[1]: Starting ignition-kargs.service... May 13 00:39:06.037794 ignition[736]: kargs: kargs passed May 13 00:39:06.033848 systemd[1]: Finished dracut-initqueue.service. May 13 00:39:06.037830 ignition[736]: Ignition finished successfully May 13 00:39:06.034808 systemd[1]: Reached target remote-fs-pre.target. May 13 00:39:06.035686 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:39:06.036597 systemd[1]: Reached target remote-fs.target. May 13 00:39:06.043651 systemd[1]: Starting dracut-pre-mount.service... May 13 00:39:06.044663 systemd[1]: Finished ignition-kargs.service. May 13 00:39:06.046208 systemd[1]: Finished dracut-pre-mount.service. May 13 00:39:06.048465 systemd[1]: Starting ignition-disks.service... May 13 00:39:06.071831 ignition[754]: Ignition 2.14.0 May 13 00:39:06.071840 ignition[754]: Stage: disks May 13 00:39:06.071922 ignition[754]: no configs at "/usr/lib/ignition/base.d" May 13 00:39:06.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.073255 systemd[1]: Finished ignition-disks.service. May 13 00:39:06.071930 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:06.073827 systemd[1]: Reached target initrd-root-device.target. May 13 00:39:06.072534 ignition[754]: disks: disks passed May 13 00:39:06.073896 systemd[1]: Reached target local-fs-pre.target. May 13 00:39:06.072566 ignition[754]: Ignition finished successfully May 13 00:39:06.074230 systemd[1]: Reached target local-fs.target. May 13 00:39:06.074398 systemd[1]: Reached target sysinit.target. May 13 00:39:06.074606 systemd[1]: Reached target basic.target. May 13 00:39:06.087891 systemd-fsck[762]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:39:06.075537 systemd[1]: Starting systemd-fsck-root.service... May 13 00:39:06.091895 systemd[1]: Finished systemd-fsck-root.service. May 13 00:39:06.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.094751 systemd[1]: Mounting sysroot.mount... May 13 00:39:06.101710 systemd[1]: Mounted sysroot.mount. May 13 00:39:06.103074 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:39:06.102028 systemd[1]: Reached target initrd-root-fs.target. May 13 00:39:06.104775 systemd[1]: Mounting sysroot-usr.mount... May 13 00:39:06.105649 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:39:06.105684 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:39:06.105702 systemd[1]: Reached target ignition-diskful.target. May 13 00:39:06.113306 systemd[1]: Mounted sysroot-usr.mount. May 13 00:39:06.114725 systemd[1]: Starting initrd-setup-root.service... May 13 00:39:06.119929 initrd-setup-root[772]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:39:06.122753 initrd-setup-root[780]: cut: /sysroot/etc/group: No such file or directory May 13 00:39:06.125266 initrd-setup-root[788]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:39:06.128811 initrd-setup-root[796]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:39:06.152818 systemd[1]: Finished initrd-setup-root.service. May 13 00:39:06.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.155330 systemd[1]: Starting ignition-mount.service... May 13 00:39:06.157375 systemd[1]: Starting sysroot-boot.service... May 13 00:39:06.163176 bash[813]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:39:06.170979 ignition[815]: INFO : Ignition 2.14.0 May 13 00:39:06.170979 ignition[815]: INFO : Stage: mount May 13 00:39:06.172669 ignition[815]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:06.172669 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:06.172669 ignition[815]: INFO : mount: mount passed May 13 00:39:06.172669 ignition[815]: INFO : Ignition finished successfully May 13 00:39:06.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.172594 systemd[1]: Finished ignition-mount.service. May 13 00:39:06.179847 systemd[1]: Finished sysroot-boot.service. May 13 00:39:06.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:06.847527 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:39:06.855696 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (823) May 13 00:39:06.855799 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:39:06.855814 kernel: BTRFS info (device vda6): using free space tree May 13 00:39:06.856528 kernel: BTRFS info (device vda6): has skinny extents May 13 00:39:06.860693 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:39:06.865085 systemd[1]: Starting ignition-files.service... May 13 00:39:06.879150 ignition[843]: INFO : Ignition 2.14.0 May 13 00:39:06.879150 ignition[843]: INFO : Stage: files May 13 00:39:06.881068 ignition[843]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:06.881068 ignition[843]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:06.883850 ignition[843]: DEBUG : files: compiled without relabeling support, skipping May 13 00:39:06.885467 ignition[843]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:39:06.885467 ignition[843]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:39:06.890153 ignition[843]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:39:06.892151 ignition[843]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:39:06.892151 ignition[843]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:39:06.892151 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 13 00:39:06.892151 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:39:06.891214 unknown[843]: wrote ssh authorized keys file for user: core May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:39:06.900626 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 00:39:07.299928 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 13 00:39:07.393972 systemd-networkd[727]: eth0: Gained IPv6LL May 13 00:39:07.705841 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:39:07.705841 ignition[843]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 13 00:39:07.709493 ignition[843]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:39:07.711530 ignition[843]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:39:07.711530 ignition[843]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 13 00:39:07.714784 ignition[843]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:39:07.714784 ignition[843]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:39:07.734949 ignition[843]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:39:07.736628 ignition[843]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:39:07.736628 ignition[843]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:39:07.736628 ignition[843]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:39:07.736628 ignition[843]: INFO : files: files passed May 13 00:39:07.736628 ignition[843]: INFO : Ignition finished successfully May 13 00:39:07.743751 systemd[1]: Finished ignition-files.service. May 13 00:39:07.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.745372 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:39:07.745805 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:39:07.746334 systemd[1]: Starting ignition-quench.service... May 13 00:39:07.748763 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:39:07.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.748826 systemd[1]: Finished ignition-quench.service. May 13 00:39:07.754670 initrd-setup-root-after-ignition[869]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:39:07.757291 initrd-setup-root-after-ignition[871]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:39:07.759157 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:39:07.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.761296 systemd[1]: Reached target ignition-complete.target. May 13 00:39:07.763856 systemd[1]: Starting initrd-parse-etc.service... May 13 00:39:07.774642 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:39:07.775701 systemd[1]: Finished initrd-parse-etc.service. May 13 00:39:07.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.777481 systemd[1]: Reached target initrd-fs.target. May 13 00:39:07.779286 systemd[1]: Reached target initrd.target. May 13 00:39:07.780846 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:39:07.782797 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:39:07.791063 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:39:07.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.793343 systemd[1]: Starting initrd-cleanup.service... May 13 00:39:07.800916 systemd[1]: Stopped target nss-lookup.target. May 13 00:39:07.802678 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:39:07.804584 systemd[1]: Stopped target timers.target. May 13 00:39:07.806211 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:39:07.807298 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:39:07.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.809126 systemd[1]: Stopped target initrd.target. May 13 00:39:07.810715 systemd[1]: Stopped target basic.target. May 13 00:39:07.812333 systemd[1]: Stopped target ignition-complete.target. May 13 00:39:07.814177 systemd[1]: Stopped target ignition-diskful.target. May 13 00:39:07.816005 systemd[1]: Stopped target initrd-root-device.target. May 13 00:39:07.817837 systemd[1]: Stopped target remote-fs.target. May 13 00:39:07.819454 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:39:07.821179 systemd[1]: Stopped target sysinit.target. May 13 00:39:07.822746 systemd[1]: Stopped target local-fs.target. May 13 00:39:07.824360 systemd[1]: Stopped target local-fs-pre.target. May 13 00:39:07.826076 systemd[1]: Stopped target swap.target. May 13 00:39:07.827536 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:39:07.828533 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:39:07.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.830261 systemd[1]: Stopped target cryptsetup.target. May 13 00:39:07.831860 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:39:07.832865 systemd[1]: Stopped dracut-initqueue.service. May 13 00:39:07.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.834520 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:39:07.835599 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:39:07.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.837436 systemd[1]: Stopped target paths.target. May 13 00:39:07.838930 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:39:07.843109 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:39:07.843520 systemd[1]: Stopped target slices.target. May 13 00:39:07.845377 systemd[1]: Stopped target sockets.target. May 13 00:39:07.846613 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:39:07.846702 systemd[1]: Closed iscsid.socket. May 13 00:39:07.848300 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:39:07.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.848378 systemd[1]: Closed iscsiuio.socket. May 13 00:39:07.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.849769 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:39:07.849887 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:39:07.851103 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:39:07.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.851206 systemd[1]: Stopped ignition-files.service. May 13 00:39:07.853983 systemd[1]: Stopping ignition-mount.service... May 13 00:39:07.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.854449 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:39:07.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.854566 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:39:07.857685 systemd[1]: Stopping sysroot-boot.service... May 13 00:39:07.858648 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:39:07.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.858811 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:39:07.860204 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:39:07.860334 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:39:07.864751 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:39:07.864836 systemd[1]: Finished initrd-cleanup.service. May 13 00:39:07.869295 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:39:07.877882 ignition[884]: INFO : Ignition 2.14.0 May 13 00:39:07.877882 ignition[884]: INFO : Stage: umount May 13 00:39:07.879469 ignition[884]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:39:07.879469 ignition[884]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:39:07.882170 ignition[884]: INFO : umount: umount passed May 13 00:39:07.882951 ignition[884]: INFO : Ignition finished successfully May 13 00:39:07.884273 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:39:07.884348 systemd[1]: Stopped ignition-mount.service. May 13 00:39:07.886076 systemd[1]: Stopped target network.target. May 13 00:39:07.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.887438 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:39:07.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.887475 systemd[1]: Stopped ignition-disks.service. May 13 00:39:07.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.889020 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:39:07.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.889061 systemd[1]: Stopped ignition-kargs.service. May 13 00:39:07.890693 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:39:07.890729 systemd[1]: Stopped ignition-setup.service. May 13 00:39:07.892192 systemd[1]: Stopping systemd-networkd.service... May 13 00:39:07.893690 systemd[1]: Stopping systemd-resolved.service... May 13 00:39:07.899827 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:39:07.899901 systemd[1]: Stopped systemd-resolved.service. May 13 00:39:07.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.906102 systemd-networkd[727]: eth0: DHCPv6 lease lost May 13 00:39:07.907165 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:39:07.907241 systemd[1]: Stopped systemd-networkd.service. May 13 00:39:07.908000 audit: BPF prog-id=6 op=UNLOAD May 13 00:39:07.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.909954 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:39:07.910000 systemd[1]: Closed systemd-networkd.socket. May 13 00:39:07.913221 systemd[1]: Stopping network-cleanup.service... May 13 00:39:07.914788 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:39:07.914830 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:39:07.917000 audit: BPF prog-id=9 op=UNLOAD May 13 00:39:07.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.917772 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:39:07.917812 systemd[1]: Stopped systemd-sysctl.service. May 13 00:39:07.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.920513 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:39:07.920552 systemd[1]: Stopped systemd-modules-load.service. May 13 00:39:07.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.923305 systemd[1]: Stopping systemd-udevd.service... May 13 00:39:07.926178 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:39:07.927863 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:39:07.928832 systemd[1]: Stopped sysroot-boot.service. May 13 00:39:07.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.930524 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:39:07.931525 systemd[1]: Stopped systemd-udevd.service. May 13 00:39:07.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.933991 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:39:07.934029 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:39:07.936789 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:39:07.936821 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:39:07.939499 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:39:07.939535 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:39:07.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.942103 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:39:07.942134 systemd[1]: Stopped dracut-cmdline.service. May 13 00:39:07.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.944619 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:39:07.944649 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:39:07.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.947282 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:39:07.947314 systemd[1]: Stopped initrd-setup-root.service. May 13 00:39:07.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.950441 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:39:07.952218 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:39:07.953257 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:39:07.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.955316 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:39:07.956367 systemd[1]: Stopped network-cleanup.service. May 13 00:39:07.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.958143 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:39:07.959268 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:39:07.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:07.961221 systemd[1]: Reached target initrd-switch-root.target. May 13 00:39:07.963570 systemd[1]: Starting initrd-switch-root.service... May 13 00:39:07.978974 systemd[1]: Switching root. May 13 00:39:07.998941 iscsid[734]: iscsid shutting down. May 13 00:39:07.999635 systemd-journald[199]: Received SIGTERM from PID 1 (systemd). May 13 00:39:07.999661 systemd-journald[199]: Journal stopped May 13 00:39:10.497757 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:39:10.497803 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:39:10.497814 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:39:10.497830 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:39:10.497844 kernel: SELinux: policy capability open_perms=1 May 13 00:39:10.497853 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:39:10.497863 kernel: SELinux: policy capability always_check_network=0 May 13 00:39:10.497872 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:39:10.497882 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:39:10.497891 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:39:10.497901 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:39:10.497913 systemd[1]: Successfully loaded SELinux policy in 38.756ms. May 13 00:39:10.497937 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.603ms. May 13 00:39:10.497948 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:39:10.497958 systemd[1]: Detected virtualization kvm. May 13 00:39:10.497968 systemd[1]: Detected architecture x86-64. May 13 00:39:10.497979 systemd[1]: Detected first boot. May 13 00:39:10.497991 systemd[1]: Initializing machine ID from VM UUID. May 13 00:39:10.498001 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:39:10.498017 kernel: kauditd_printk_skb: 69 callbacks suppressed May 13 00:39:10.498031 kernel: audit: type=1400 audit(1747096748.218:80): avc: denied { associate } for pid=917 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:39:10.498069 kernel: audit: type=1300 audit(1747096748.218:80): arch=c000003e syscall=188 success=yes exit=0 a0=c0001078d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=900 pid=917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:10.498080 kernel: audit: type=1327 audit(1747096748.218:80): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:10.498090 kernel: audit: type=1400 audit(1747096748.219:81): avc: denied { associate } for pid=917 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:39:10.498101 kernel: audit: type=1300 audit(1747096748.219:81): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a9 a2=1ed a3=0 items=2 ppid=900 pid=917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:10.498115 kernel: audit: type=1307 audit(1747096748.219:81): cwd="/" May 13 00:39:10.498125 kernel: audit: type=1302 audit(1747096748.219:81): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:10.498134 kernel: audit: type=1302 audit(1747096748.219:81): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:10.498144 kernel: audit: type=1327 audit(1747096748.219:81): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:10.498155 systemd[1]: Populated /etc with preset unit settings. May 13 00:39:10.498166 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:39:10.498176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:39:10.498191 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:39:10.498202 kernel: audit: type=1334 audit(1747096750.363:82): prog-id=12 op=LOAD May 13 00:39:10.498211 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:39:10.498221 systemd[1]: Stopped iscsiuio.service. May 13 00:39:10.498232 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:39:10.498241 systemd[1]: Stopped iscsid.service. May 13 00:39:10.498251 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:39:10.498262 systemd[1]: Stopped initrd-switch-root.service. May 13 00:39:10.498275 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:39:10.498286 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:39:10.498296 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:39:10.498306 systemd[1]: Created slice system-getty.slice. May 13 00:39:10.498317 systemd[1]: Created slice system-modprobe.slice. May 13 00:39:10.498327 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:39:10.498337 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:39:10.498351 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:39:10.498361 systemd[1]: Created slice user.slice. May 13 00:39:10.498371 systemd[1]: Started systemd-ask-password-console.path. May 13 00:39:10.498382 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:39:10.498392 systemd[1]: Set up automount boot.automount. May 13 00:39:10.498401 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:39:10.498411 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:39:10.498421 systemd[1]: Stopped target initrd-fs.target. May 13 00:39:10.498431 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:39:10.498445 systemd[1]: Reached target integritysetup.target. May 13 00:39:10.498459 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:39:10.498470 systemd[1]: Reached target remote-fs.target. May 13 00:39:10.498481 systemd[1]: Reached target slices.target. May 13 00:39:10.498491 systemd[1]: Reached target swap.target. May 13 00:39:10.498501 systemd[1]: Reached target torcx.target. May 13 00:39:10.498515 systemd[1]: Reached target veritysetup.target. May 13 00:39:10.498525 systemd[1]: Listening on systemd-coredump.socket. May 13 00:39:10.498534 systemd[1]: Listening on systemd-initctl.socket. May 13 00:39:10.498544 systemd[1]: Listening on systemd-networkd.socket. May 13 00:39:10.498554 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:39:10.498564 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:39:10.498574 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:39:10.498585 systemd[1]: Mounting dev-hugepages.mount... May 13 00:39:10.498594 systemd[1]: Mounting dev-mqueue.mount... May 13 00:39:10.498604 systemd[1]: Mounting media.mount... May 13 00:39:10.498618 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:10.498628 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:39:10.498639 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:39:10.498649 systemd[1]: Mounting tmp.mount... May 13 00:39:10.498659 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:39:10.498680 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:10.498692 systemd[1]: Starting kmod-static-nodes.service... May 13 00:39:10.498703 systemd[1]: Starting modprobe@configfs.service... May 13 00:39:10.498715 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:10.498731 systemd[1]: Starting modprobe@drm.service... May 13 00:39:10.498743 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:10.498754 systemd[1]: Starting modprobe@fuse.service... May 13 00:39:10.498766 systemd[1]: Starting modprobe@loop.service... May 13 00:39:10.498778 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:39:10.498791 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:39:10.498804 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:39:10.498817 kernel: loop: module loaded May 13 00:39:10.498835 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:39:10.498850 kernel: fuse: init (API version 7.34) May 13 00:39:10.498863 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:39:10.498879 systemd[1]: Stopped systemd-journald.service. May 13 00:39:10.498890 systemd[1]: Starting systemd-journald.service... May 13 00:39:10.498901 systemd[1]: Starting systemd-modules-load.service... May 13 00:39:10.498911 systemd[1]: Starting systemd-network-generator.service... May 13 00:39:10.498921 systemd[1]: Starting systemd-remount-fs.service... May 13 00:39:10.498931 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:39:10.498941 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:39:10.498956 systemd[1]: Stopped verity-setup.service. May 13 00:39:10.498969 systemd-journald[1006]: Journal started May 13 00:39:10.499006 systemd-journald[1006]: Runtime Journal (/run/log/journal/24bfc2e6cb6d42279c7ea482013bdeaf) is 6.0M, max 48.5M, 42.5M free. May 13 00:39:08.058000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:39:08.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:39:08.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:39:08.186000 audit: BPF prog-id=10 op=LOAD May 13 00:39:08.186000 audit: BPF prog-id=10 op=UNLOAD May 13 00:39:08.186000 audit: BPF prog-id=11 op=LOAD May 13 00:39:08.186000 audit: BPF prog-id=11 op=UNLOAD May 13 00:39:08.218000 audit[917]: AVC avc: denied { associate } for pid=917 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:39:08.218000 audit[917]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=900 pid=917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.218000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:08.219000 audit[917]: AVC avc: denied { associate } for pid=917 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:39:08.219000 audit[917]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a9 a2=1ed a3=0 items=2 ppid=900 pid=917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.219000 audit: CWD cwd="/" May 13 00:39:08.219000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:08.219000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:08.219000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:39:10.363000 audit: BPF prog-id=12 op=LOAD May 13 00:39:10.363000 audit: BPF prog-id=3 op=UNLOAD May 13 00:39:10.364000 audit: BPF prog-id=13 op=LOAD May 13 00:39:10.364000 audit: BPF prog-id=14 op=LOAD May 13 00:39:10.364000 audit: BPF prog-id=4 op=UNLOAD May 13 00:39:10.364000 audit: BPF prog-id=5 op=UNLOAD May 13 00:39:10.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.376000 audit: BPF prog-id=12 op=UNLOAD May 13 00:39:10.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.482000 audit: BPF prog-id=15 op=LOAD May 13 00:39:10.482000 audit: BPF prog-id=16 op=LOAD May 13 00:39:10.482000 audit: BPF prog-id=17 op=LOAD May 13 00:39:10.482000 audit: BPF prog-id=13 op=UNLOAD May 13 00:39:10.482000 audit: BPF prog-id=14 op=UNLOAD May 13 00:39:10.496000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:39:10.496000 audit[1006]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd84f206c0 a2=4000 a3=7ffd84f2075c items=0 ppid=1 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:10.496000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:39:08.216239 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:39:10.361410 systemd[1]: Queued start job for default target multi-user.target. May 13 00:39:08.216482 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:39:10.361422 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:39:08.216502 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:39:10.365537 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:39:10.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:08.216536 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:39:08.216548 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:39:08.216581 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:39:08.216595 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:39:08.217007 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:39:08.217052 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:39:08.217069 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:39:08.217806 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:39:08.217839 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:39:08.217855 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:39:08.217868 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:39:08.217884 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:39:08.217897 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:39:10.101248 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:10.101501 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:10.101595 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:10.102227 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:39:10.102303 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:39:10.102365 /usr/lib/systemd/system-generators/torcx-generator[917]: time="2025-05-13T00:39:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:39:10.503057 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:10.506057 systemd[1]: Started systemd-journald.service. May 13 00:39:10.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.507112 systemd[1]: Mounted dev-hugepages.mount. May 13 00:39:10.507998 systemd[1]: Mounted dev-mqueue.mount. May 13 00:39:10.508820 systemd[1]: Mounted media.mount. May 13 00:39:10.509633 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:39:10.510544 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:39:10.511485 systemd[1]: Mounted tmp.mount. May 13 00:39:10.512438 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:39:10.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.513545 systemd[1]: Finished kmod-static-nodes.service. May 13 00:39:10.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.514635 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:39:10.514814 systemd[1]: Finished modprobe@configfs.service. May 13 00:39:10.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.515922 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:10.516262 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:10.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.517353 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:39:10.517506 systemd[1]: Finished modprobe@drm.service. May 13 00:39:10.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.518567 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:10.518728 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:10.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.519852 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:39:10.520006 systemd[1]: Finished modprobe@fuse.service. May 13 00:39:10.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.521091 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:10.521254 systemd[1]: Finished modprobe@loop.service. May 13 00:39:10.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.522360 systemd[1]: Finished systemd-modules-load.service. May 13 00:39:10.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.523497 systemd[1]: Finished systemd-network-generator.service. May 13 00:39:10.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.524695 systemd[1]: Finished systemd-remount-fs.service. May 13 00:39:10.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.525895 systemd[1]: Reached target network-pre.target. May 13 00:39:10.527656 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:39:10.529288 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:39:10.530030 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:39:10.531270 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:39:10.532850 systemd[1]: Starting systemd-journal-flush.service... May 13 00:39:10.533885 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:10.534730 systemd[1]: Starting systemd-random-seed.service... May 13 00:39:10.535498 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:10.536317 systemd[1]: Starting systemd-sysctl.service... May 13 00:39:10.538237 systemd[1]: Starting systemd-sysusers.service... May 13 00:39:10.541064 systemd-journald[1006]: Time spent on flushing to /var/log/journal/24bfc2e6cb6d42279c7ea482013bdeaf is 18.114ms for 1073 entries. May 13 00:39:10.541064 systemd-journald[1006]: System Journal (/var/log/journal/24bfc2e6cb6d42279c7ea482013bdeaf) is 8.0M, max 195.6M, 187.6M free. May 13 00:39:10.576352 systemd-journald[1006]: Received client request to flush runtime journal. May 13 00:39:10.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.541265 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:39:10.544416 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:39:10.576858 udevadm[1020]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 13 00:39:10.547238 systemd[1]: Finished systemd-random-seed.service. May 13 00:39:10.548521 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:39:10.549675 systemd[1]: Reached target first-boot-complete.target. May 13 00:39:10.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.552147 systemd[1]: Starting systemd-udev-settle.service... May 13 00:39:10.559180 systemd[1]: Finished systemd-sysctl.service. May 13 00:39:10.562620 systemd[1]: Finished systemd-sysusers.service. May 13 00:39:10.577150 systemd[1]: Finished systemd-journal-flush.service. May 13 00:39:10.952862 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:39:10.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.954000 audit: BPF prog-id=18 op=LOAD May 13 00:39:10.954000 audit: BPF prog-id=19 op=LOAD May 13 00:39:10.954000 audit: BPF prog-id=7 op=UNLOAD May 13 00:39:10.954000 audit: BPF prog-id=8 op=UNLOAD May 13 00:39:10.955138 systemd[1]: Starting systemd-udevd.service... May 13 00:39:10.970319 systemd-udevd[1023]: Using default interface naming scheme 'v252'. May 13 00:39:10.981972 systemd[1]: Started systemd-udevd.service. May 13 00:39:10.984704 systemd[1]: Starting systemd-networkd.service... May 13 00:39:10.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:10.983000 audit: BPF prog-id=20 op=LOAD May 13 00:39:10.990000 audit: BPF prog-id=21 op=LOAD May 13 00:39:10.991424 systemd[1]: Starting systemd-userdbd.service... May 13 00:39:10.990000 audit: BPF prog-id=22 op=LOAD May 13 00:39:10.990000 audit: BPF prog-id=23 op=LOAD May 13 00:39:11.005187 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:39:11.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.018156 systemd[1]: Started systemd-userdbd.service. May 13 00:39:11.024834 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:39:11.048093 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:39:11.052072 kernel: ACPI: button: Power Button [PWRF] May 13 00:39:11.058772 systemd-networkd[1033]: lo: Link UP May 13 00:39:11.059070 systemd-networkd[1033]: lo: Gained carrier May 13 00:39:11.059538 systemd-networkd[1033]: Enumeration completed May 13 00:39:11.059623 systemd[1]: Started systemd-networkd.service. May 13 00:39:11.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.060121 systemd-networkd[1033]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:39:11.062995 systemd-networkd[1033]: eth0: Link UP May 13 00:39:11.063004 systemd-networkd[1033]: eth0: Gained carrier May 13 00:39:11.064000 audit[1035]: AVC avc: denied { confidentiality } for pid=1035 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:39:11.064000 audit[1035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5595f5864b40 a1=338ac a2=7f82294c8bc5 a3=5 items=110 ppid=1023 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.064000 audit: CWD cwd="/" May 13 00:39:11.064000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=1 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=2 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=3 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=4 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=5 name=(null) inode=14671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=6 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=7 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=8 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=9 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=10 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=11 name=(null) inode=14674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=12 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=13 name=(null) inode=14675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=14 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=15 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=16 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=17 name=(null) inode=14677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=18 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=19 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=20 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=21 name=(null) inode=14679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=22 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=23 name=(null) inode=14680 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=24 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=25 name=(null) inode=14681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=26 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=27 name=(null) inode=14682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=28 name=(null) inode=14678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=29 name=(null) inode=14683 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=30 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=31 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=32 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=33 name=(null) inode=14685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=34 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=35 name=(null) inode=14686 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=36 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=37 name=(null) inode=14687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=38 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=39 name=(null) inode=14688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=40 name=(null) inode=14684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=41 name=(null) inode=14689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=42 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=43 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=44 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=45 name=(null) inode=14691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=46 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=47 name=(null) inode=14692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=48 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=49 name=(null) inode=14693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=50 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=51 name=(null) inode=14694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=52 name=(null) inode=14690 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=53 name=(null) inode=14695 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=55 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=56 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=57 name=(null) inode=14697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=58 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=59 name=(null) inode=14698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=60 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=61 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=62 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=63 name=(null) inode=14700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=64 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=65 name=(null) inode=14701 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=66 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=67 name=(null) inode=14702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=68 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=69 name=(null) inode=14703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=70 name=(null) inode=14699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=71 name=(null) inode=14704 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=72 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=73 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=74 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=75 name=(null) inode=14706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=76 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=77 name=(null) inode=14707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=78 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=79 name=(null) inode=14708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=80 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=81 name=(null) inode=14709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.078146 systemd-networkd[1033]: eth0: DHCPv4 address 10.0.0.28/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:39:11.064000 audit: PATH item=82 name=(null) inode=14705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=83 name=(null) inode=14710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=84 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=85 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=86 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=87 name=(null) inode=14712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=88 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=89 name=(null) inode=14713 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=90 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=91 name=(null) inode=14714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=92 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=93 name=(null) inode=14715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=94 name=(null) inode=14711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=95 name=(null) inode=14716 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=96 name=(null) inode=14696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=97 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=98 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=99 name=(null) inode=14718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=100 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=101 name=(null) inode=14719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=102 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=103 name=(null) inode=14720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=104 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=105 name=(null) inode=14721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=106 name=(null) inode=14717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=107 name=(null) inode=14722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PATH item=109 name=(null) inode=13141 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:11.064000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:39:11.093069 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:39:11.094215 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:39:11.094329 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:39:11.098087 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:39:11.102063 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:39:11.146515 kernel: kvm: Nested Virtualization enabled May 13 00:39:11.146604 kernel: SVM: kvm: Nested Paging enabled May 13 00:39:11.146618 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:39:11.146630 kernel: SVM: Virtual GIF supported May 13 00:39:11.161086 kernel: EDAC MC: Ver: 3.0.0 May 13 00:39:11.185418 systemd[1]: Finished systemd-udev-settle.service. May 13 00:39:11.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.187522 systemd[1]: Starting lvm2-activation-early.service... May 13 00:39:11.194695 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:39:11.220740 systemd[1]: Finished lvm2-activation-early.service. May 13 00:39:11.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.221722 systemd[1]: Reached target cryptsetup.target. May 13 00:39:11.223431 systemd[1]: Starting lvm2-activation.service... May 13 00:39:11.226525 lvm[1058]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:39:11.249692 systemd[1]: Finished lvm2-activation.service. May 13 00:39:11.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.250590 systemd[1]: Reached target local-fs-pre.target. May 13 00:39:11.251444 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:39:11.251463 systemd[1]: Reached target local-fs.target. May 13 00:39:11.252267 systemd[1]: Reached target machines.target. May 13 00:39:11.253875 systemd[1]: Starting ldconfig.service... May 13 00:39:11.254830 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:11.254862 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.255678 systemd[1]: Starting systemd-boot-update.service... May 13 00:39:11.257341 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:39:11.259307 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:39:11.261658 systemd[1]: Starting systemd-sysext.service... May 13 00:39:11.263940 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1060 (bootctl) May 13 00:39:11.265171 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:39:11.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.270062 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:39:11.273753 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:39:11.278606 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:39:11.278793 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:39:11.291077 kernel: loop0: detected capacity change from 0 to 205544 May 13 00:39:11.299323 systemd-fsck[1068]: fsck.fat 4.2 (2021-01-31) May 13 00:39:11.299323 systemd-fsck[1068]: /dev/vda1: 790 files, 120692/258078 clusters May 13 00:39:11.300955 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:39:11.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.305375 systemd[1]: Mounting boot.mount... May 13 00:39:11.413778 systemd[1]: Mounted boot.mount. May 13 00:39:11.422695 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:39:11.424088 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:39:11.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.427654 systemd[1]: Finished systemd-boot-update.service. May 13 00:39:11.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.444062 kernel: loop1: detected capacity change from 0 to 205544 May 13 00:39:11.447724 (sd-sysext)[1073]: Using extensions 'kubernetes'. May 13 00:39:11.448018 (sd-sysext)[1073]: Merged extensions into '/usr'. May 13 00:39:11.466762 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:11.468804 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:11.471204 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:11.473912 systemd[1]: Starting modprobe@loop.service... May 13 00:39:11.474951 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:11.475102 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.475996 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:11.476125 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:11.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.477334 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:11.477432 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:11.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.478687 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:11.478759 ldconfig[1059]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:39:11.478780 systemd[1]: Finished modprobe@loop.service. May 13 00:39:11.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.480128 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:11.480216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:11.483876 systemd[1]: Finished ldconfig.service. May 13 00:39:11.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.503965 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:39:11.504448 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.505781 systemd[1]: Mounting usr-share-oem.mount... May 13 00:39:11.506565 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.510615 systemd[1]: Mounted usr-share-oem.mount. May 13 00:39:11.512433 systemd[1]: Finished systemd-sysext.service. May 13 00:39:11.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.514601 systemd[1]: Starting ensure-sysext.service... May 13 00:39:11.516233 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:39:11.520963 systemd[1]: Reloading. May 13 00:39:11.529335 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:39:11.531505 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:39:11.534575 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:39:11.569209 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-05-13T00:39:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:39:11.569536 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-05-13T00:39:11Z" level=info msg="torcx already run" May 13 00:39:11.633014 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:39:11.633032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:39:11.649968 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:39:11.702000 audit: BPF prog-id=24 op=LOAD May 13 00:39:11.702000 audit: BPF prog-id=20 op=UNLOAD May 13 00:39:11.703000 audit: BPF prog-id=25 op=LOAD May 13 00:39:11.703000 audit: BPF prog-id=21 op=UNLOAD May 13 00:39:11.703000 audit: BPF prog-id=26 op=LOAD May 13 00:39:11.703000 audit: BPF prog-id=27 op=LOAD May 13 00:39:11.703000 audit: BPF prog-id=22 op=UNLOAD May 13 00:39:11.703000 audit: BPF prog-id=23 op=UNLOAD May 13 00:39:11.704000 audit: BPF prog-id=28 op=LOAD May 13 00:39:11.704000 audit: BPF prog-id=15 op=UNLOAD May 13 00:39:11.705000 audit: BPF prog-id=29 op=LOAD May 13 00:39:11.705000 audit: BPF prog-id=30 op=LOAD May 13 00:39:11.705000 audit: BPF prog-id=16 op=UNLOAD May 13 00:39:11.705000 audit: BPF prog-id=17 op=UNLOAD May 13 00:39:11.705000 audit: BPF prog-id=31 op=LOAD May 13 00:39:11.705000 audit: BPF prog-id=32 op=LOAD May 13 00:39:11.705000 audit: BPF prog-id=18 op=UNLOAD May 13 00:39:11.705000 audit: BPF prog-id=19 op=UNLOAD May 13 00:39:11.707314 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:39:11.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.711873 systemd[1]: Starting audit-rules.service... May 13 00:39:11.713545 systemd[1]: Starting clean-ca-certificates.service... May 13 00:39:11.715343 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:39:11.718000 audit: BPF prog-id=33 op=LOAD May 13 00:39:11.720000 audit: BPF prog-id=34 op=LOAD May 13 00:39:11.719449 systemd[1]: Starting systemd-resolved.service... May 13 00:39:11.721577 systemd[1]: Starting systemd-timesyncd.service... May 13 00:39:11.723213 systemd[1]: Starting systemd-update-utmp.service... May 13 00:39:11.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.727000 audit[1154]: SYSTEM_BOOT pid=1154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:39:11.724514 systemd[1]: Finished clean-ca-certificates.service. May 13 00:39:11.728816 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:11.732455 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.732631 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:11.733679 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:11.735664 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:11.737472 systemd[1]: Starting modprobe@loop.service... May 13 00:39:11.738381 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:11.738509 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.738605 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:11.738681 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.739710 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:39:11.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.741324 systemd[1]: Finished systemd-update-utmp.service. May 13 00:39:11.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.742708 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:11.742806 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:11.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.744200 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:11.744295 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:11.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:11.745725 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:11.745827 systemd[1]: Finished modprobe@loop.service. May 13 00:39:11.745000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:39:11.745000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbf561b20 a2=420 a3=0 items=0 ppid=1143 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.745000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:39:11.746357 augenrules[1166]: No rules May 13 00:39:11.747029 systemd[1]: Finished audit-rules.service. May 13 00:39:11.748319 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:11.748445 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:11.749872 systemd[1]: Starting systemd-update-done.service... May 13 00:39:11.752091 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.752269 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:11.753429 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:11.755317 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:11.757173 systemd[1]: Starting modprobe@loop.service... May 13 00:39:11.757967 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:11.758136 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.758268 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:11.758338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.759122 systemd[1]: Finished systemd-update-done.service. May 13 00:39:11.760413 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:11.760511 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:11.761709 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:11.761823 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:11.763235 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:11.763359 systemd[1]: Finished modprobe@loop.service. May 13 00:39:11.764587 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:11.764722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:11.768370 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.768659 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:39:11.770171 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:39:11.772300 systemd[1]: Starting modprobe@drm.service... May 13 00:39:11.774487 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:39:11.777188 systemd[1]: Starting modprobe@loop.service... May 13 00:39:11.778104 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:39:11.778295 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.779875 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:39:11.780882 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:39:11.781034 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:39:11.782524 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:39:11.782675 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:39:11.784180 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:39:11.784317 systemd[1]: Finished modprobe@drm.service. May 13 00:39:11.785643 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:39:11.785775 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:39:11.787132 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:39:11.787276 systemd[1]: Finished modprobe@loop.service. May 13 00:39:11.788300 systemd-resolved[1147]: Positive Trust Anchors: May 13 00:39:11.788307 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:39:11.788334 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:39:11.789981 systemd[1]: Finished ensure-sysext.service. May 13 00:39:11.791248 systemd[1]: Started systemd-timesyncd.service. May 13 00:39:11.791566 systemd-timesyncd[1153]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:39:11.791598 systemd-timesyncd[1153]: Initial clock synchronization to Tue 2025-05-13 00:39:11.797608 UTC. May 13 00:39:11.793652 systemd[1]: Reached target time-set.target. May 13 00:39:11.794666 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:39:11.794709 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:39:11.795899 systemd-resolved[1147]: Defaulting to hostname 'linux'. May 13 00:39:11.797204 systemd[1]: Started systemd-resolved.service. May 13 00:39:11.798151 systemd[1]: Reached target network.target. May 13 00:39:11.798995 systemd[1]: Reached target nss-lookup.target. May 13 00:39:11.800017 systemd[1]: Reached target sysinit.target. May 13 00:39:11.800997 systemd[1]: Started motdgen.path. May 13 00:39:11.801733 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:39:11.803059 systemd[1]: Started logrotate.timer. May 13 00:39:11.803884 systemd[1]: Started mdadm.timer. May 13 00:39:11.804568 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:39:11.805468 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:39:11.805488 systemd[1]: Reached target paths.target. May 13 00:39:11.806273 systemd[1]: Reached target timers.target. May 13 00:39:11.807420 systemd[1]: Listening on dbus.socket. May 13 00:39:11.809283 systemd[1]: Starting docker.socket... May 13 00:39:11.812153 systemd[1]: Listening on sshd.socket. May 13 00:39:11.813008 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.813377 systemd[1]: Listening on docker.socket. May 13 00:39:11.814205 systemd[1]: Reached target sockets.target. May 13 00:39:11.815013 systemd[1]: Reached target basic.target. May 13 00:39:11.815809 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:39:11.815833 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:39:11.816630 systemd[1]: Starting containerd.service... May 13 00:39:11.818266 systemd[1]: Starting dbus.service... May 13 00:39:11.819795 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:39:11.821608 systemd[1]: Starting extend-filesystems.service... May 13 00:39:11.822508 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:39:11.824329 jq[1185]: false May 13 00:39:11.823394 systemd[1]: Starting motdgen.service... May 13 00:39:11.825064 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:39:11.828929 systemd[1]: Starting sshd-keygen.service... May 13 00:39:11.831546 extend-filesystems[1186]: Found loop1 May 13 00:39:11.831546 extend-filesystems[1186]: Found sr0 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda May 13 00:39:11.837299 extend-filesystems[1186]: Found vda1 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda2 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda3 May 13 00:39:11.837299 extend-filesystems[1186]: Found usr May 13 00:39:11.837299 extend-filesystems[1186]: Found vda4 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda6 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda7 May 13 00:39:11.837299 extend-filesystems[1186]: Found vda9 May 13 00:39:11.837299 extend-filesystems[1186]: Checking size of /dev/vda9 May 13 00:39:11.831609 systemd[1]: Starting systemd-logind.service... May 13 00:39:11.844669 dbus-daemon[1184]: [system] SELinux support is enabled May 13 00:39:11.832364 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:39:11.832406 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:39:11.832802 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:39:11.861972 jq[1198]: true May 13 00:39:11.833507 systemd[1]: Starting update-engine.service... May 13 00:39:11.835112 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:39:11.862300 jq[1207]: true May 13 00:39:11.837490 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:39:11.837647 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:39:11.837926 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:39:11.838057 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:39:11.844782 systemd[1]: Started dbus.service. May 13 00:39:11.862621 update_engine[1196]: I0513 00:39:11.862479 1196 main.cc:92] Flatcar Update Engine starting May 13 00:39:11.848017 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:39:11.848072 systemd[1]: Reached target system-config.target. May 13 00:39:11.850992 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:39:11.851009 systemd[1]: Reached target user-config.target. May 13 00:39:11.857782 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:39:11.857910 systemd[1]: Finished motdgen.service. May 13 00:39:11.880964 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:39:11.881070 update_engine[1196]: I0513 00:39:11.867316 1196 update_check_scheduler.cc:74] Next update check in 9m8s May 13 00:39:11.881181 extend-filesystems[1186]: Resized partition /dev/vda9 May 13 00:39:11.867275 systemd[1]: Started update-engine.service. May 13 00:39:11.882365 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:39:11.869477 systemd[1]: Started locksmithd.service. May 13 00:39:11.891296 env[1206]: time="2025-05-13T00:39:11.888405150Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:39:11.890794 systemd-logind[1193]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:39:11.890809 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:39:11.891940 systemd-logind[1193]: New seat seat0. May 13 00:39:11.895209 systemd[1]: Started systemd-logind.service. May 13 00:39:11.912073 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:39:11.912158 env[1206]: time="2025-05-13T00:39:11.912096666Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:39:11.935969 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:39:11.935969 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:39:11.935969 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:39:11.941626 extend-filesystems[1186]: Resized filesystem in /dev/vda9 May 13 00:39:11.938076 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:39:11.942873 env[1206]: time="2025-05-13T00:39:11.937189170Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.938238 systemd[1]: Finished extend-filesystems.service. May 13 00:39:11.943215 env[1206]: time="2025-05-13T00:39:11.943164092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:11.943215 env[1206]: time="2025-05-13T00:39:11.943203596Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.943422 env[1206]: time="2025-05-13T00:39:11.943393101Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:11.943422 env[1206]: time="2025-05-13T00:39:11.943413079Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.943474 env[1206]: time="2025-05-13T00:39:11.943425412Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:39:11.943474 env[1206]: time="2025-05-13T00:39:11.943435381Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.943513 env[1206]: time="2025-05-13T00:39:11.943495123Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.943715 env[1206]: time="2025-05-13T00:39:11.943689888Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:39:11.943811 env[1206]: time="2025-05-13T00:39:11.943794034Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:39:11.943836 env[1206]: time="2025-05-13T00:39:11.943810474Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:39:11.943864 env[1206]: time="2025-05-13T00:39:11.943850169Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:39:11.943892 env[1206]: time="2025-05-13T00:39:11.943864536Z" level=info msg="metadata content store policy set" policy=shared May 13 00:39:11.947303 bash[1235]: Updated "/home/core/.ssh/authorized_keys" May 13 00:39:11.947994 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:39:11.951798 env[1206]: time="2025-05-13T00:39:11.951747317Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:39:11.951858 env[1206]: time="2025-05-13T00:39:11.951808122Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:39:11.951858 env[1206]: time="2025-05-13T00:39:11.951833038Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:39:11.951933 env[1206]: time="2025-05-13T00:39:11.951890476Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:39:11.951933 env[1206]: time="2025-05-13T00:39:11.951924991Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:39:11.951993 env[1206]: time="2025-05-13T00:39:11.951943696Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:39:11.951993 env[1206]: time="2025-05-13T00:39:11.951961920Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:39:11.951993 env[1206]: time="2025-05-13T00:39:11.951983801Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:39:11.952074 env[1206]: time="2025-05-13T00:39:11.952005141Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:39:11.952074 env[1206]: time="2025-05-13T00:39:11.952024538Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:39:11.952074 env[1206]: time="2025-05-13T00:39:11.952054594Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:39:11.952140 env[1206]: time="2025-05-13T00:39:11.952073389Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:39:11.952244 env[1206]: time="2025-05-13T00:39:11.952215115Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:39:11.952341 env[1206]: time="2025-05-13T00:39:11.952315894Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:39:11.952660 env[1206]: time="2025-05-13T00:39:11.952621768Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:39:11.952688 env[1206]: time="2025-05-13T00:39:11.952670430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952709 env[1206]: time="2025-05-13T00:39:11.952688604Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:39:11.952760 env[1206]: time="2025-05-13T00:39:11.952737165Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952784 env[1206]: time="2025-05-13T00:39:11.952759948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952784 env[1206]: time="2025-05-13T00:39:11.952777781Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952822 env[1206]: time="2025-05-13T00:39:11.952794422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952822 env[1206]: time="2025-05-13T00:39:11.952810873Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952860 env[1206]: time="2025-05-13T00:39:11.952835569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952860 env[1206]: time="2025-05-13T00:39:11.952852281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952900 env[1206]: time="2025-05-13T00:39:11.952868832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:39:11.952900 env[1206]: time="2025-05-13T00:39:11.952886946Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:39:11.953057 env[1206]: time="2025-05-13T00:39:11.953018382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:39:11.953132 env[1206]: time="2025-05-13T00:39:11.953099915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:39:11.953132 env[1206]: time="2025-05-13T00:39:11.953124472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:39:11.953214 env[1206]: time="2025-05-13T00:39:11.953141564Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:39:11.953214 env[1206]: time="2025-05-13T00:39:11.953162623Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:39:11.953214 env[1206]: time="2025-05-13T00:39:11.953178222Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:39:11.953214 env[1206]: time="2025-05-13T00:39:11.953206936Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:39:11.953293 env[1206]: time="2025-05-13T00:39:11.953249296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:39:11.953574 env[1206]: time="2025-05-13T00:39:11.953498954Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:39:11.954216 env[1206]: time="2025-05-13T00:39:11.953572462Z" level=info msg="Connect containerd service" May 13 00:39:11.954216 env[1206]: time="2025-05-13T00:39:11.953609963Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:39:11.954399 env[1206]: time="2025-05-13T00:39:11.954361643Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:39:11.954607 env[1206]: time="2025-05-13T00:39:11.954526372Z" level=info msg="Start subscribing containerd event" May 13 00:39:11.954607 env[1206]: time="2025-05-13T00:39:11.954589200Z" level=info msg="Start recovering state" May 13 00:39:11.954705 env[1206]: time="2025-05-13T00:39:11.954662247Z" level=info msg="Start event monitor" May 13 00:39:11.955604 env[1206]: time="2025-05-13T00:39:11.955560322Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:39:11.955690 env[1206]: time="2025-05-13T00:39:11.955667333Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:39:11.955762 env[1206]: time="2025-05-13T00:39:11.955735030Z" level=info msg="containerd successfully booted in 0.069499s" May 13 00:39:11.955845 systemd[1]: Started containerd.service. May 13 00:39:11.957401 env[1206]: time="2025-05-13T00:39:11.957237680Z" level=info msg="Start snapshots syncer" May 13 00:39:11.957606 env[1206]: time="2025-05-13T00:39:11.957578920Z" level=info msg="Start cni network conf syncer for default" May 13 00:39:11.957606 env[1206]: time="2025-05-13T00:39:11.957604348Z" level=info msg="Start streaming server" May 13 00:39:11.959953 locksmithd[1222]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:39:12.068258 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:39:12.084992 systemd[1]: Finished sshd-keygen.service. May 13 00:39:12.087525 systemd[1]: Starting issuegen.service... May 13 00:39:12.093079 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:39:12.093215 systemd[1]: Finished issuegen.service. May 13 00:39:12.095405 systemd[1]: Starting systemd-user-sessions.service... May 13 00:39:12.100449 systemd[1]: Finished systemd-user-sessions.service. May 13 00:39:12.102610 systemd[1]: Started getty@tty1.service. May 13 00:39:12.104397 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:39:12.105447 systemd[1]: Reached target getty.target. May 13 00:39:13.025423 systemd-networkd[1033]: eth0: Gained IPv6LL May 13 00:39:13.027967 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:39:13.030028 systemd[1]: Reached target network-online.target. May 13 00:39:13.033984 systemd[1]: Starting kubelet.service... May 13 00:39:13.781297 systemd[1]: Started kubelet.service. May 13 00:39:13.782767 systemd[1]: Reached target multi-user.target. May 13 00:39:13.784722 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:39:13.791194 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:39:13.791375 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:39:13.792586 systemd[1]: Startup finished in 687ms (kernel) + 4.229s (initrd) + 5.774s (userspace) = 10.691s. May 13 00:39:14.240975 kubelet[1262]: E0513 00:39:14.240853 1262 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:39:14.242724 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:39:14.242840 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:39:14.243064 systemd[1]: kubelet.service: Consumed 1.093s CPU time. May 13 00:39:16.105584 systemd[1]: Created slice system-sshd.slice. May 13 00:39:16.106549 systemd[1]: Started sshd@0-10.0.0.28:22-10.0.0.1:42302.service. May 13 00:39:16.141401 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 42302 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.142944 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.150498 systemd[1]: Created slice user-500.slice. May 13 00:39:16.151498 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:39:16.153301 systemd-logind[1193]: New session 1 of user core. May 13 00:39:16.159025 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:39:16.160296 systemd[1]: Starting user@500.service... May 13 00:39:16.162936 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.230506 systemd[1274]: Queued start job for default target default.target. May 13 00:39:16.230961 systemd[1274]: Reached target paths.target. May 13 00:39:16.230984 systemd[1274]: Reached target sockets.target. May 13 00:39:16.231006 systemd[1274]: Reached target timers.target. May 13 00:39:16.231017 systemd[1274]: Reached target basic.target. May 13 00:39:16.231071 systemd[1274]: Reached target default.target. May 13 00:39:16.231094 systemd[1274]: Startup finished in 63ms. May 13 00:39:16.231164 systemd[1]: Started user@500.service. May 13 00:39:16.232212 systemd[1]: Started session-1.scope. May 13 00:39:16.284233 systemd[1]: Started sshd@1-10.0.0.28:22-10.0.0.1:42316.service. May 13 00:39:16.318705 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 42316 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.319992 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.324432 systemd-logind[1193]: New session 2 of user core. May 13 00:39:16.325810 systemd[1]: Started session-2.scope. May 13 00:39:16.384220 sshd[1283]: pam_unix(sshd:session): session closed for user core May 13 00:39:16.387625 systemd[1]: sshd@1-10.0.0.28:22-10.0.0.1:42316.service: Deactivated successfully. May 13 00:39:16.388246 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:39:16.388849 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. May 13 00:39:16.389804 systemd[1]: Started sshd@2-10.0.0.28:22-10.0.0.1:58236.service. May 13 00:39:16.390856 systemd-logind[1193]: Removed session 2. May 13 00:39:16.423578 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 58236 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.424854 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.428747 systemd-logind[1193]: New session 3 of user core. May 13 00:39:16.429498 systemd[1]: Started session-3.scope. May 13 00:39:16.478946 sshd[1289]: pam_unix(sshd:session): session closed for user core May 13 00:39:16.481842 systemd[1]: sshd@2-10.0.0.28:22-10.0.0.1:58236.service: Deactivated successfully. May 13 00:39:16.482336 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:39:16.483018 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. May 13 00:39:16.483954 systemd[1]: Started sshd@3-10.0.0.28:22-10.0.0.1:58242.service. May 13 00:39:16.484906 systemd-logind[1193]: Removed session 3. May 13 00:39:16.516137 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 58242 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.517412 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.521337 systemd-logind[1193]: New session 4 of user core. May 13 00:39:16.522405 systemd[1]: Started session-4.scope. May 13 00:39:16.578232 sshd[1296]: pam_unix(sshd:session): session closed for user core May 13 00:39:16.580873 systemd[1]: sshd@3-10.0.0.28:22-10.0.0.1:58242.service: Deactivated successfully. May 13 00:39:16.581362 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:39:16.581846 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. May 13 00:39:16.582752 systemd[1]: Started sshd@4-10.0.0.28:22-10.0.0.1:58254.service. May 13 00:39:16.583452 systemd-logind[1193]: Removed session 4. May 13 00:39:16.616711 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 58254 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.618212 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.621497 systemd-logind[1193]: New session 5 of user core. May 13 00:39:16.622207 systemd[1]: Started session-5.scope. May 13 00:39:16.677739 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:39:16.677919 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:16.684339 dbus-daemon[1184]: Ѝ\xb7#\xd6U: received setenforce notice (enforcing=-1779123824) May 13 00:39:16.686393 sudo[1305]: pam_unix(sudo:session): session closed for user root May 13 00:39:16.688643 sshd[1302]: pam_unix(sshd:session): session closed for user core May 13 00:39:16.692633 systemd[1]: sshd@4-10.0.0.28:22-10.0.0.1:58254.service: Deactivated successfully. May 13 00:39:16.693381 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:39:16.694328 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. May 13 00:39:16.695655 systemd[1]: Started sshd@5-10.0.0.28:22-10.0.0.1:58258.service. May 13 00:39:16.696592 systemd-logind[1193]: Removed session 5. May 13 00:39:16.727507 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 58258 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.728861 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.733263 systemd-logind[1193]: New session 6 of user core. May 13 00:39:16.734367 systemd[1]: Started session-6.scope. May 13 00:39:16.791800 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:39:16.792078 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:16.795505 sudo[1313]: pam_unix(sudo:session): session closed for user root May 13 00:39:16.801566 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:39:16.801834 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:16.812364 systemd[1]: Stopping audit-rules.service... May 13 00:39:16.813000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:39:16.814358 auditctl[1316]: No rules May 13 00:39:16.814844 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:39:16.815092 systemd[1]: Stopped audit-rules.service. May 13 00:39:16.815246 kernel: kauditd_printk_skb: 220 callbacks suppressed May 13 00:39:16.815279 kernel: audit: type=1305 audit(1747096756.813:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:39:16.817149 systemd[1]: Starting audit-rules.service... May 13 00:39:16.813000 audit[1316]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd095f560 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.823152 kernel: audit: type=1300 audit(1747096756.813:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd095f560 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.824881 kernel: audit: type=1327 audit(1747096756.813:186): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:39:16.813000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:39:16.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.828947 kernel: audit: type=1131 audit(1747096756.814:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.833870 augenrules[1333]: No rules May 13 00:39:16.834642 systemd[1]: Finished audit-rules.service. May 13 00:39:16.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.835625 sudo[1312]: pam_unix(sudo:session): session closed for user root May 13 00:39:16.834000 audit[1312]: USER_END pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.840470 sshd[1309]: pam_unix(sshd:session): session closed for user core May 13 00:39:16.843381 systemd[1]: sshd@5-10.0.0.28:22-10.0.0.1:58258.service: Deactivated successfully. May 13 00:39:16.844267 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:39:16.844640 kernel: audit: type=1130 audit(1747096756.833:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.844710 kernel: audit: type=1106 audit(1747096756.834:189): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.844739 kernel: audit: type=1104 audit(1747096756.834:190): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.834000 audit[1312]: CRED_DISP pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.844942 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. May 13 00:39:16.840000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.849716 systemd[1]: Started sshd@6-10.0.0.28:22-10.0.0.1:58270.service. May 13 00:39:16.850624 systemd-logind[1193]: Removed session 6. May 13 00:39:16.852480 kernel: audit: type=1106 audit(1747096756.840:191): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.852570 kernel: audit: type=1104 audit(1747096756.840:192): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.840000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.855824 kernel: audit: type=1131 audit(1747096756.842:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.28:22-10.0.0.1:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.28:22-10.0.0.1:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.28:22-10.0.0.1:58270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.883000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.884798 sshd[1339]: Accepted publickey for core from 10.0.0.1 port 58270 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:16.884000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.884000 audit[1339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedf475840 a2=3 a3=0 items=0 ppid=1 pid=1339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:16.886326 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:16.890700 systemd-logind[1193]: New session 7 of user core. May 13 00:39:16.891827 systemd[1]: Started session-7.scope. May 13 00:39:16.896000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.898000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:16.948000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.948000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.949579 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:39:16.949843 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:39:16.951000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:16.966553 systemd[1]: Starting coreos-metadata.service... May 13 00:39:16.976411 systemd[1]: coreos-metadata.service: Deactivated successfully. May 13 00:39:16.976624 systemd[1]: Finished coreos-metadata.service. May 13 00:39:16.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:16.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:17.489423 systemd[1]: Stopped kubelet.service. May 13 00:39:17.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:17.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:17.489605 systemd[1]: kubelet.service: Consumed 1.093s CPU time. May 13 00:39:17.491529 systemd[1]: Starting kubelet.service... May 13 00:39:17.513356 systemd[1]: Reloading. May 13 00:39:17.588824 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-05-13T00:39:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:39:17.588850 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-05-13T00:39:17Z" level=info msg="torcx already run" May 13 00:39:17.891340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:39:17.891357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:39:17.908601 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:39:17.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.972000 audit: BPF prog-id=40 op=LOAD May 13 00:39:17.973000 audit: BPF prog-id=35 op=UNLOAD May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit: BPF prog-id=41 op=LOAD May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.973000 audit: BPF prog-id=42 op=LOAD May 13 00:39:17.973000 audit: BPF prog-id=36 op=UNLOAD May 13 00:39:17.973000 audit: BPF prog-id=37 op=UNLOAD May 13 00:39:17.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.974000 audit: BPF prog-id=43 op=LOAD May 13 00:39:17.974000 audit: BPF prog-id=24 op=UNLOAD May 13 00:39:17.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.975000 audit: BPF prog-id=44 op=LOAD May 13 00:39:17.975000 audit: BPF prog-id=33 op=UNLOAD May 13 00:39:17.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit: BPF prog-id=45 op=LOAD May 13 00:39:17.977000 audit: BPF prog-id=25 op=UNLOAD May 13 00:39:17.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit: BPF prog-id=46 op=LOAD May 13 00:39:17.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.978000 audit: BPF prog-id=47 op=LOAD May 13 00:39:17.978000 audit: BPF prog-id=26 op=UNLOAD May 13 00:39:17.978000 audit: BPF prog-id=27 op=UNLOAD May 13 00:39:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.980000 audit: BPF prog-id=48 op=LOAD May 13 00:39:17.980000 audit: BPF prog-id=34 op=UNLOAD May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit: BPF prog-id=49 op=LOAD May 13 00:39:17.981000 audit: BPF prog-id=38 op=UNLOAD May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit: BPF prog-id=50 op=LOAD May 13 00:39:17.982000 audit: BPF prog-id=28 op=UNLOAD May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit: BPF prog-id=51 op=LOAD May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.982000 audit: BPF prog-id=52 op=LOAD May 13 00:39:17.982000 audit: BPF prog-id=29 op=UNLOAD May 13 00:39:17.982000 audit: BPF prog-id=30 op=UNLOAD May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit: BPF prog-id=53 op=LOAD May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:17.983000 audit: BPF prog-id=54 op=LOAD May 13 00:39:17.983000 audit: BPF prog-id=31 op=UNLOAD May 13 00:39:17.984000 audit: BPF prog-id=32 op=UNLOAD May 13 00:39:17.993750 systemd[1]: Started kubelet.service. May 13 00:39:17.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:18.000094 systemd[1]: Stopping kubelet.service... May 13 00:39:18.000737 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:39:18.000919 systemd[1]: Stopped kubelet.service. May 13 00:39:17.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:18.002751 systemd[1]: Starting kubelet.service... May 13 00:39:18.077963 systemd[1]: Started kubelet.service. May 13 00:39:18.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:18.110866 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:39:18.110866 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:39:18.110866 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:39:18.111920 kubelet[1454]: I0513 00:39:18.111868 1454 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:39:18.358449 kubelet[1454]: I0513 00:39:18.358327 1454 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:39:18.358449 kubelet[1454]: I0513 00:39:18.358359 1454 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:39:18.358625 kubelet[1454]: I0513 00:39:18.358603 1454 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:39:18.378719 kubelet[1454]: I0513 00:39:18.378516 1454 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:39:18.386580 kubelet[1454]: E0513 00:39:18.386519 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:39:18.386580 kubelet[1454]: I0513 00:39:18.386556 1454 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:39:18.393476 kubelet[1454]: I0513 00:39:18.393449 1454 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:39:18.395359 kubelet[1454]: I0513 00:39:18.395333 1454 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:39:18.395670 kubelet[1454]: I0513 00:39:18.395598 1454 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:39:18.396217 kubelet[1454]: I0513 00:39:18.395648 1454 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.28","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:39:18.396365 kubelet[1454]: I0513 00:39:18.396226 1454 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:39:18.396365 kubelet[1454]: I0513 00:39:18.396238 1454 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:39:18.396365 kubelet[1454]: I0513 00:39:18.396339 1454 state_mem.go:36] "Initialized new in-memory state store" May 13 00:39:18.400121 kubelet[1454]: I0513 00:39:18.400088 1454 kubelet.go:408] "Attempting to sync node with API server" May 13 00:39:18.400121 kubelet[1454]: I0513 00:39:18.400115 1454 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:39:18.400203 kubelet[1454]: I0513 00:39:18.400151 1454 kubelet.go:314] "Adding apiserver pod source" May 13 00:39:18.400203 kubelet[1454]: I0513 00:39:18.400164 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:39:18.400253 kubelet[1454]: E0513 00:39:18.400207 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:18.400283 kubelet[1454]: E0513 00:39:18.400265 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:18.403666 kubelet[1454]: W0513 00:39:18.403629 1454 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.28" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 13 00:39:18.403666 kubelet[1454]: E0513 00:39:18.403665 1454 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.28\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 13 00:39:18.407430 kubelet[1454]: I0513 00:39:18.407399 1454 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:39:18.408880 kubelet[1454]: I0513 00:39:18.408863 1454 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:39:18.408941 kubelet[1454]: W0513 00:39:18.408934 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:39:18.409538 kubelet[1454]: I0513 00:39:18.409515 1454 server.go:1269] "Started kubelet" May 13 00:39:18.409000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:18.409000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:39:18.409000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004a96b0 a1=c00003ffb0 a2=c0004a9650 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.409000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:39:18.409000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:18.409000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:39:18.409000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005019c0 a1=c00003ffc8 a2=c0004a97d0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.409000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:39:18.411028 kubelet[1454]: I0513 00:39:18.410715 1454 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:39:18.411028 kubelet[1454]: I0513 00:39:18.410760 1454 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:39:18.411028 kubelet[1454]: I0513 00:39:18.410813 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:39:18.429128 kubelet[1454]: I0513 00:39:18.429061 1454 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:39:18.429486 kubelet[1454]: I0513 00:39:18.429424 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:39:18.429737 kubelet[1454]: I0513 00:39:18.429714 1454 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:39:18.429959 kubelet[1454]: I0513 00:39:18.429937 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:39:18.430488 kubelet[1454]: I0513 00:39:18.430475 1454 server.go:460] "Adding debug handlers to kubelet server" May 13 00:39:18.431309 kubelet[1454]: I0513 00:39:18.431296 1454 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:39:18.431626 kubelet[1454]: E0513 00:39:18.431606 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:18.431887 kubelet[1454]: I0513 00:39:18.431872 1454 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:39:18.432021 kubelet[1454]: I0513 00:39:18.431998 1454 reconciler.go:26] "Reconciler: start to sync state" May 13 00:39:18.434919 kubelet[1454]: I0513 00:39:18.434905 1454 factory.go:221] Registration of the containerd container factory successfully May 13 00:39:18.434997 kubelet[1454]: I0513 00:39:18.434985 1454 factory.go:221] Registration of the systemd container factory successfully May 13 00:39:18.435182 kubelet[1454]: I0513 00:39:18.435165 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:39:18.435854 kubelet[1454]: E0513 00:39:18.435822 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.28\" not found" node="10.0.0.28" May 13 00:39:18.437614 kubelet[1454]: E0513 00:39:18.437600 1454 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:39:18.439000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.439000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb28eaae0 a2=0 a3=7ffcb28eaacc items=0 ppid=1454 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:39:18.440000 audit[1474]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.440000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffca7153c40 a2=0 a3=7ffca7153c2c items=0 ppid=1454 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:39:18.446225 kubelet[1454]: I0513 00:39:18.446199 1454 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:39:18.446225 kubelet[1454]: I0513 00:39:18.446217 1454 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:39:18.446327 kubelet[1454]: I0513 00:39:18.446233 1454 state_mem.go:36] "Initialized new in-memory state store" May 13 00:39:18.532470 kubelet[1454]: E0513 00:39:18.532423 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:18.633010 kubelet[1454]: E0513 00:39:18.632872 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:18.644193 kubelet[1454]: I0513 00:39:18.644134 1454 policy_none.go:49] "None policy: Start" May 13 00:39:18.645265 kubelet[1454]: I0513 00:39:18.645170 1454 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:39:18.645265 kubelet[1454]: I0513 00:39:18.645195 1454 state_mem.go:35] "Initializing new in-memory state store" May 13 00:39:18.441000 audit[1476]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.441000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb0106390 a2=0 a3=7fffb010637c items=0 ppid=1454 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:18.647000 audit[1481]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.647000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe9b3d8320 a2=0 a3=7ffe9b3d830c items=0 ppid=1454 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:18.652293 systemd[1]: Created slice kubepods.slice. May 13 00:39:18.659372 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:39:18.661877 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:39:18.667771 kubelet[1454]: I0513 00:39:18.667740 1454 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:39:18.667845 kubelet[1454]: I0513 00:39:18.667800 1454 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:39:18.667921 kubelet[1454]: I0513 00:39:18.667896 1454 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:39:18.667964 kubelet[1454]: I0513 00:39:18.667918 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:39:18.668180 kubelet[1454]: I0513 00:39:18.668160 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:39:18.666000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:18.666000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:39:18.666000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d58360 a1=c000b74c30 a2=c000d58330 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:39:18.669901 kubelet[1454]: E0513 00:39:18.669887 1454 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.28\" not found" May 13 00:39:18.682000 audit[1486]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.682000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe8cdd4a30 a2=0 a3=7ffe8cdd4a1c items=0 ppid=1454 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:39:18.683773 kubelet[1454]: I0513 00:39:18.683644 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:39:18.683000 audit[1487]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:18.683000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5b10e8d0 a2=0 a3=7ffd5b10e8bc items=0 ppid=1454 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:39:18.684533 kubelet[1454]: I0513 00:39:18.684505 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:39:18.684605 kubelet[1454]: I0513 00:39:18.684542 1454 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:39:18.683000 audit[1488]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.683000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe51818c30 a2=0 a3=7ffe51818c1c items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:39:18.684874 kubelet[1454]: I0513 00:39:18.684786 1454 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:39:18.685084 kubelet[1454]: E0513 00:39:18.685059 1454 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 13 00:39:18.684000 audit[1489]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:18.684000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc427773e0 a2=0 a3=7ffc427773cc items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:39:18.684000 audit[1490]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.684000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff58e5b3c0 a2=0 a3=7fff58e5b3ac items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:39:18.685000 audit[1491]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:18.685000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffcc9382e0 a2=0 a3=7fffcc9382cc items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:39:18.685000 audit[1492]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:18.685000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe036110f0 a2=0 a3=7ffe036110dc items=0 ppid=1454 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:39:18.686000 audit[1493]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:18.686000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb2273b70 a2=0 a3=7ffeb2273b5c items=0 ppid=1454 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:39:18.769547 kubelet[1454]: I0513 00:39:18.769520 1454 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.28" May 13 00:39:18.773957 kubelet[1454]: I0513 00:39:18.773925 1454 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.28" May 13 00:39:18.773957 kubelet[1454]: E0513 00:39:18.773958 1454 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.28\": node \"10.0.0.28\" not found" May 13 00:39:18.788903 kubelet[1454]: E0513 00:39:18.788869 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:18.889484 kubelet[1454]: E0513 00:39:18.889315 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:18.990376 kubelet[1454]: E0513 00:39:18.990298 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.091284 kubelet[1454]: E0513 00:39:19.091190 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.098179 sudo[1343]: pam_unix(sudo:session): session closed for user root May 13 00:39:19.097000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:19.097000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:39:19.099346 sshd[1339]: pam_unix(sshd:session): session closed for user core May 13 00:39:19.099000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.099000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.101393 systemd[1]: sshd@6-10.0.0.28:22-10.0.0.1:58270.service: Deactivated successfully. May 13 00:39:19.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.28:22-10.0.0.1:58270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:19.102082 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:39:19.102659 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. May 13 00:39:19.103480 systemd-logind[1193]: Removed session 7. May 13 00:39:19.192138 kubelet[1454]: E0513 00:39:19.191960 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.292844 kubelet[1454]: E0513 00:39:19.292754 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.360760 kubelet[1454]: I0513 00:39:19.360672 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 13 00:39:19.360949 kubelet[1454]: W0513 00:39:19.360867 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:39:19.360949 kubelet[1454]: W0513 00:39:19.360874 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:39:19.360949 kubelet[1454]: W0513 00:39:19.360867 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:39:19.393138 kubelet[1454]: E0513 00:39:19.393086 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.401322 kubelet[1454]: E0513 00:39:19.401288 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:19.493551 kubelet[1454]: E0513 00:39:19.493398 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" May 13 00:39:19.594087 kubelet[1454]: I0513 00:39:19.594031 1454 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 13 00:39:19.594457 env[1206]: time="2025-05-13T00:39:19.594407394Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:39:19.594688 kubelet[1454]: I0513 00:39:19.594671 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 13 00:39:20.401570 kubelet[1454]: E0513 00:39:20.401511 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:20.401570 kubelet[1454]: I0513 00:39:20.401535 1454 apiserver.go:52] "Watching apiserver" May 13 00:39:20.404800 kubelet[1454]: E0513 00:39:20.404760 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:20.410594 systemd[1]: Created slice kubepods-besteffort-pod8da2fed7_9c47_4e6f_b601_d0392bdd98d2.slice. May 13 00:39:20.423720 systemd[1]: Created slice kubepods-besteffort-pod07b7d690_4a42_43bc_9aba_47d8495b503c.slice. May 13 00:39:20.432364 kubelet[1454]: I0513 00:39:20.432332 1454 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:39:20.443926 kubelet[1454]: I0513 00:39:20.443892 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-lib-modules\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.443926 kubelet[1454]: I0513 00:39:20.443919 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07b7d690-4a42-43bc-9aba-47d8495b503c-tigera-ca-bundle\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444019 kubelet[1454]: I0513 00:39:20.443936 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/07b7d690-4a42-43bc-9aba-47d8495b503c-node-certs\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444019 kubelet[1454]: I0513 00:39:20.443950 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-cni-log-dir\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444019 kubelet[1454]: I0513 00:39:20.443964 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2f5de204-aa00-4a75-a752-0e7e97211ab2-registration-dir\") pod \"csi-node-driver-cjlrr\" (UID: \"2f5de204-aa00-4a75-a752-0e7e97211ab2\") " pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:20.444019 kubelet[1454]: I0513 00:39:20.443982 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ngp5h\" (UniqueName: \"kubernetes.io/projected/2f5de204-aa00-4a75-a752-0e7e97211ab2-kube-api-access-ngp5h\") pod \"csi-node-driver-cjlrr\" (UID: \"2f5de204-aa00-4a75-a752-0e7e97211ab2\") " pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:20.444019 kubelet[1454]: I0513 00:39:20.443996 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8da2fed7-9c47-4e6f-b601-d0392bdd98d2-lib-modules\") pod \"kube-proxy-2x4n9\" (UID: \"8da2fed7-9c47-4e6f-b601-d0392bdd98d2\") " pod="kube-system/kube-proxy-2x4n9" May 13 00:39:20.444168 kubelet[1454]: I0513 00:39:20.444098 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-var-lib-calico\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444168 kubelet[1454]: I0513 00:39:20.444155 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-44b6k\" (UniqueName: \"kubernetes.io/projected/07b7d690-4a42-43bc-9aba-47d8495b503c-kube-api-access-44b6k\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444213 kubelet[1454]: I0513 00:39:20.444186 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8da2fed7-9c47-4e6f-b601-d0392bdd98d2-xtables-lock\") pod \"kube-proxy-2x4n9\" (UID: \"8da2fed7-9c47-4e6f-b601-d0392bdd98d2\") " pod="kube-system/kube-proxy-2x4n9" May 13 00:39:20.444213 kubelet[1454]: I0513 00:39:20.444202 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-xtables-lock\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444273 kubelet[1454]: I0513 00:39:20.444222 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-policysync\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444273 kubelet[1454]: I0513 00:39:20.444242 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-var-run-calico\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444324 kubelet[1454]: I0513 00:39:20.444272 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2f5de204-aa00-4a75-a752-0e7e97211ab2-kubelet-dir\") pod \"csi-node-driver-cjlrr\" (UID: \"2f5de204-aa00-4a75-a752-0e7e97211ab2\") " pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:20.444324 kubelet[1454]: I0513 00:39:20.444310 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2f5de204-aa00-4a75-a752-0e7e97211ab2-socket-dir\") pod \"csi-node-driver-cjlrr\" (UID: \"2f5de204-aa00-4a75-a752-0e7e97211ab2\") " pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:20.444365 kubelet[1454]: I0513 00:39:20.444326 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8da2fed7-9c47-4e6f-b601-d0392bdd98d2-kube-proxy\") pod \"kube-proxy-2x4n9\" (UID: \"8da2fed7-9c47-4e6f-b601-d0392bdd98d2\") " pod="kube-system/kube-proxy-2x4n9" May 13 00:39:20.444365 kubelet[1454]: I0513 00:39:20.444342 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dg7r5\" (UniqueName: \"kubernetes.io/projected/8da2fed7-9c47-4e6f-b601-d0392bdd98d2-kube-api-access-dg7r5\") pod \"kube-proxy-2x4n9\" (UID: \"8da2fed7-9c47-4e6f-b601-d0392bdd98d2\") " pod="kube-system/kube-proxy-2x4n9" May 13 00:39:20.444406 kubelet[1454]: I0513 00:39:20.444385 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-cni-bin-dir\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444431 kubelet[1454]: I0513 00:39:20.444408 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-cni-net-dir\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444549 kubelet[1454]: I0513 00:39:20.444516 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/07b7d690-4a42-43bc-9aba-47d8495b503c-flexvol-driver-host\") pod \"calico-node-mb979\" (UID: \"07b7d690-4a42-43bc-9aba-47d8495b503c\") " pod="calico-system/calico-node-mb979" May 13 00:39:20.444594 kubelet[1454]: I0513 00:39:20.444557 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2f5de204-aa00-4a75-a752-0e7e97211ab2-varrun\") pod \"csi-node-driver-cjlrr\" (UID: \"2f5de204-aa00-4a75-a752-0e7e97211ab2\") " pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:20.546357 kubelet[1454]: I0513 00:39:20.546287 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:39:20.546514 kubelet[1454]: E0513 00:39:20.546299 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.546514 kubelet[1454]: W0513 00:39:20.546442 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.546514 kubelet[1454]: E0513 00:39:20.546478 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.546691 kubelet[1454]: E0513 00:39:20.546668 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.546691 kubelet[1454]: W0513 00:39:20.546679 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.546691 kubelet[1454]: E0513 00:39:20.546686 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.546905 kubelet[1454]: E0513 00:39:20.546888 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.546939 kubelet[1454]: W0513 00:39:20.546906 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.546939 kubelet[1454]: E0513 00:39:20.546932 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.547155 kubelet[1454]: E0513 00:39:20.547138 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.547155 kubelet[1454]: W0513 00:39:20.547150 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.547237 kubelet[1454]: E0513 00:39:20.547164 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.547410 kubelet[1454]: E0513 00:39:20.547394 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.547410 kubelet[1454]: W0513 00:39:20.547406 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.547474 kubelet[1454]: E0513 00:39:20.547421 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.547616 kubelet[1454]: E0513 00:39:20.547602 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.547616 kubelet[1454]: W0513 00:39:20.547614 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.547678 kubelet[1454]: E0513 00:39:20.547651 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.547830 kubelet[1454]: E0513 00:39:20.547814 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.547830 kubelet[1454]: W0513 00:39:20.547829 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.547908 kubelet[1454]: E0513 00:39:20.547861 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.548025 kubelet[1454]: E0513 00:39:20.547996 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548025 kubelet[1454]: W0513 00:39:20.548007 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548025 kubelet[1454]: E0513 00:39:20.548037 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.548241 kubelet[1454]: E0513 00:39:20.548217 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548241 kubelet[1454]: W0513 00:39:20.548228 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548314 kubelet[1454]: E0513 00:39:20.548251 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.548432 kubelet[1454]: E0513 00:39:20.548415 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548432 kubelet[1454]: W0513 00:39:20.548426 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548524 kubelet[1454]: E0513 00:39:20.548448 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.548580 kubelet[1454]: E0513 00:39:20.548562 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548580 kubelet[1454]: W0513 00:39:20.548573 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548685 kubelet[1454]: E0513 00:39:20.548670 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548685 kubelet[1454]: W0513 00:39:20.548680 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548796 kubelet[1454]: E0513 00:39:20.548772 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548796 kubelet[1454]: W0513 00:39:20.548788 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.548906 kubelet[1454]: E0513 00:39:20.548891 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.548906 kubelet[1454]: W0513 00:39:20.548902 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549123 kubelet[1454]: E0513 00:39:20.549099 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549123 kubelet[1454]: W0513 00:39:20.549112 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549257 kubelet[1454]: E0513 00:39:20.549234 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549257 kubelet[1454]: W0513 00:39:20.549241 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549377 kubelet[1454]: E0513 00:39:20.549351 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549377 kubelet[1454]: W0513 00:39:20.549365 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549470 kubelet[1454]: E0513 00:39:20.549458 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549470 kubelet[1454]: W0513 00:39:20.549464 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549572 kubelet[1454]: E0513 00:39:20.549554 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549572 kubelet[1454]: W0513 00:39:20.549564 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549572 kubelet[1454]: E0513 00:39:20.549573 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.549705 kubelet[1454]: E0513 00:39:20.549686 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549705 kubelet[1454]: W0513 00:39:20.549692 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549705 kubelet[1454]: E0513 00:39:20.549699 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.549842 kubelet[1454]: E0513 00:39:20.549824 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.549953 kubelet[1454]: E0513 00:39:20.549936 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.549953 kubelet[1454]: W0513 00:39:20.549947 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.549953 kubelet[1454]: E0513 00:39:20.549955 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550232 kubelet[1454]: E0513 00:39:20.550212 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.550232 kubelet[1454]: W0513 00:39:20.550228 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.550345 kubelet[1454]: E0513 00:39:20.550242 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550345 kubelet[1454]: E0513 00:39:20.550268 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550416 kubelet[1454]: E0513 00:39:20.550411 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.550450 kubelet[1454]: W0513 00:39:20.550419 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.550450 kubelet[1454]: E0513 00:39:20.550427 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550657 kubelet[1454]: E0513 00:39:20.550640 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.550709 kubelet[1454]: W0513 00:39:20.550653 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.550709 kubelet[1454]: E0513 00:39:20.550676 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550709 kubelet[1454]: E0513 00:39:20.550695 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.550890 kubelet[1454]: E0513 00:39:20.550866 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.550890 kubelet[1454]: W0513 00:39:20.550885 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.551002 kubelet[1454]: E0513 00:39:20.550898 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551078 kubelet[1454]: E0513 00:39:20.551052 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.551078 kubelet[1454]: W0513 00:39:20.551070 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.551170 kubelet[1454]: E0513 00:39:20.551082 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551416 kubelet[1454]: E0513 00:39:20.551326 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.551416 kubelet[1454]: W0513 00:39:20.551340 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.551416 kubelet[1454]: E0513 00:39:20.551351 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551416 kubelet[1454]: E0513 00:39:20.551370 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551578 kubelet[1454]: E0513 00:39:20.551477 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551578 kubelet[1454]: E0513 00:39:20.551504 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551578 kubelet[1454]: E0513 00:39:20.551525 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551638 kubelet[1454]: E0513 00:39:20.551623 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.551786 kubelet[1454]: E0513 00:39:20.551768 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.551786 kubelet[1454]: W0513 00:39:20.551779 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.551786 kubelet[1454]: E0513 00:39:20.551786 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552039 kubelet[1454]: E0513 00:39:20.551976 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552039 kubelet[1454]: W0513 00:39:20.551989 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552039 kubelet[1454]: E0513 00:39:20.551998 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552197 kubelet[1454]: E0513 00:39:20.552177 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552197 kubelet[1454]: W0513 00:39:20.552190 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552197 kubelet[1454]: E0513 00:39:20.552200 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552370 kubelet[1454]: E0513 00:39:20.552352 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552370 kubelet[1454]: W0513 00:39:20.552364 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552436 kubelet[1454]: E0513 00:39:20.552378 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552533 kubelet[1454]: E0513 00:39:20.552518 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552533 kubelet[1454]: W0513 00:39:20.552527 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552609 kubelet[1454]: E0513 00:39:20.552539 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552725 kubelet[1454]: E0513 00:39:20.552712 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552749 kubelet[1454]: W0513 00:39:20.552724 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552749 kubelet[1454]: E0513 00:39:20.552737 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552859 kubelet[1454]: E0513 00:39:20.552847 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552859 kubelet[1454]: W0513 00:39:20.552857 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.552923 kubelet[1454]: E0513 00:39:20.552868 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.552983 kubelet[1454]: E0513 00:39:20.552968 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.552983 kubelet[1454]: W0513 00:39:20.552977 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553122 kubelet[1454]: E0513 00:39:20.553004 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553208 kubelet[1454]: E0513 00:39:20.553193 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553208 kubelet[1454]: W0513 00:39:20.553203 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553282 kubelet[1454]: E0513 00:39:20.553231 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553372 kubelet[1454]: E0513 00:39:20.553359 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553395 kubelet[1454]: W0513 00:39:20.553370 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553416 kubelet[1454]: E0513 00:39:20.553402 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553517 kubelet[1454]: E0513 00:39:20.553508 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553543 kubelet[1454]: W0513 00:39:20.553516 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553543 kubelet[1454]: E0513 00:39:20.553536 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553668 kubelet[1454]: E0513 00:39:20.553661 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553691 kubelet[1454]: W0513 00:39:20.553668 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553712 kubelet[1454]: E0513 00:39:20.553689 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553807 kubelet[1454]: E0513 00:39:20.553799 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553830 kubelet[1454]: W0513 00:39:20.553808 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.553830 kubelet[1454]: E0513 00:39:20.553826 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.553961 kubelet[1454]: E0513 00:39:20.553953 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.553983 kubelet[1454]: W0513 00:39:20.553961 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.554010 kubelet[1454]: E0513 00:39:20.553980 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.554121 kubelet[1454]: E0513 00:39:20.554112 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.554145 kubelet[1454]: W0513 00:39:20.554120 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.554145 kubelet[1454]: E0513 00:39:20.554131 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.554364 kubelet[1454]: E0513 00:39:20.554347 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.554364 kubelet[1454]: W0513 00:39:20.554360 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.554437 kubelet[1454]: E0513 00:39:20.554376 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.554514 kubelet[1454]: E0513 00:39:20.554501 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.554514 kubelet[1454]: W0513 00:39:20.554511 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.554579 kubelet[1454]: E0513 00:39:20.554524 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.554730 kubelet[1454]: E0513 00:39:20.554717 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.554730 kubelet[1454]: W0513 00:39:20.554728 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.554780 kubelet[1454]: E0513 00:39:20.554739 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.554955 kubelet[1454]: E0513 00:39:20.554942 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.554955 kubelet[1454]: W0513 00:39:20.554954 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.555018 kubelet[1454]: E0513 00:39:20.554970 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.555176 kubelet[1454]: E0513 00:39:20.555159 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.555176 kubelet[1454]: W0513 00:39:20.555172 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.555274 kubelet[1454]: E0513 00:39:20.555189 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.555366 kubelet[1454]: E0513 00:39:20.555352 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.555366 kubelet[1454]: W0513 00:39:20.555362 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.555444 kubelet[1454]: E0513 00:39:20.555376 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.555527 kubelet[1454]: E0513 00:39:20.555513 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.555527 kubelet[1454]: W0513 00:39:20.555523 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.555590 kubelet[1454]: E0513 00:39:20.555532 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.562969 kubelet[1454]: E0513 00:39:20.562317 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.562969 kubelet[1454]: W0513 00:39:20.562330 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.562969 kubelet[1454]: E0513 00:39:20.562344 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.562969 kubelet[1454]: E0513 00:39:20.562574 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.562969 kubelet[1454]: W0513 00:39:20.562583 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.562969 kubelet[1454]: E0513 00:39:20.562592 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.564256 kubelet[1454]: E0513 00:39:20.564234 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:20.564256 kubelet[1454]: W0513 00:39:20.564247 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:20.564256 kubelet[1454]: E0513 00:39:20.564257 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:20.722825 kubelet[1454]: E0513 00:39:20.722687 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:20.723549 env[1206]: time="2025-05-13T00:39:20.723494965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2x4n9,Uid:8da2fed7-9c47-4e6f-b601-d0392bdd98d2,Namespace:kube-system,Attempt:0,}" May 13 00:39:20.727653 kubelet[1454]: E0513 00:39:20.727632 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:20.728038 env[1206]: time="2025-05-13T00:39:20.727996553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mb979,Uid:07b7d690-4a42-43bc-9aba-47d8495b503c,Namespace:calico-system,Attempt:0,}" May 13 00:39:21.402032 kubelet[1454]: E0513 00:39:21.401981 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:21.549593 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2991672683.mount: Deactivated successfully. May 13 00:39:21.553075 env[1206]: time="2025-05-13T00:39:21.553010445Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.553991 env[1206]: time="2025-05-13T00:39:21.553952373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.562326 env[1206]: time="2025-05-13T00:39:21.562287907Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.563254 env[1206]: time="2025-05-13T00:39:21.563224904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.564399 env[1206]: time="2025-05-13T00:39:21.564361549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.565869 env[1206]: time="2025-05-13T00:39:21.565835448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.567892 env[1206]: time="2025-05-13T00:39:21.567860979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.571165 env[1206]: time="2025-05-13T00:39:21.571139238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:21.589162 env[1206]: time="2025-05-13T00:39:21.589013800Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:21.589162 env[1206]: time="2025-05-13T00:39:21.589060578Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:21.589162 env[1206]: time="2025-05-13T00:39:21.589069917Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:21.589284 env[1206]: time="2025-05-13T00:39:21.589185599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947 pid=1567 runtime=io.containerd.runc.v2 May 13 00:39:21.594638 env[1206]: time="2025-05-13T00:39:21.594578686Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:21.594745 env[1206]: time="2025-05-13T00:39:21.594638381Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:21.594745 env[1206]: time="2025-05-13T00:39:21.594659414Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:21.601247 env[1206]: time="2025-05-13T00:39:21.594789897Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70036b31dcb16a87c8f591bf6358b1b8f0e738421d8a60ed39b3de0ad844c60e pid=1577 runtime=io.containerd.runc.v2 May 13 00:39:21.614389 systemd[1]: Started cri-containerd-70036b31dcb16a87c8f591bf6358b1b8f0e738421d8a60ed39b3de0ad844c60e.scope. May 13 00:39:21.616655 systemd[1]: Started cri-containerd-a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947.scope. May 13 00:39:21.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.647000 audit: BPF prog-id=55 op=LOAD May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1567 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643933323030343665633534646465346333303534613062363830 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1567 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643933323030343665633534646465346333303534613062363830 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit: BPF prog-id=56 op=LOAD May 13 00:39:21.648000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0000ddce0 items=0 ppid=1567 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643933323030343665633534646465346333303534613062363830 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit: BPF prog-id=57 op=LOAD May 13 00:39:21.648000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0000ddd28 items=0 ppid=1567 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643933323030343665633534646465346333303534613062363830 May 13 00:39:21.648000 audit: BPF prog-id=57 op=UNLOAD May 13 00:39:21.648000 audit: BPF prog-id=56 op=UNLOAD May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.648000 audit: BPF prog-id=58 op=LOAD May 13 00:39:21.648000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003c6138 items=0 ppid=1567 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643933323030343665633534646465346333303534613062363830 May 13 00:39:21.663422 env[1206]: time="2025-05-13T00:39:21.663382495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mb979,Uid:07b7d690-4a42-43bc-9aba-47d8495b503c,Namespace:calico-system,Attempt:0,} returns sandbox id \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\"" May 13 00:39:21.664752 kubelet[1454]: E0513 00:39:21.664707 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:21.665652 env[1206]: time="2025-05-13T00:39:21.665599116Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:39:21.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.667000 audit: BPF prog-id=59 op=LOAD May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1577 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303336623331646362313661383763386635393162663633353862 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1577 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303336623331646362313661383763386635393162663633353862 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit: BPF prog-id=60 op=LOAD May 13 00:39:21.668000 audit[1590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003960d0 items=0 ppid=1577 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303336623331646362313661383763386635393162663633353862 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit: BPF prog-id=61 op=LOAD May 13 00:39:21.668000 audit[1590]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000396118 items=0 ppid=1577 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303336623331646362313661383763386635393162663633353862 May 13 00:39:21.668000 audit: BPF prog-id=61 op=UNLOAD May 13 00:39:21.668000 audit: BPF prog-id=60 op=UNLOAD May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { perfmon } for pid=1590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit[1590]: AVC avc: denied { bpf } for pid=1590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:21.668000 audit: BPF prog-id=62 op=LOAD May 13 00:39:21.668000 audit[1590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000396528 items=0 ppid=1577 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303336623331646362313661383763386635393162663633353862 May 13 00:39:21.682582 env[1206]: time="2025-05-13T00:39:21.682537973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2x4n9,Uid:8da2fed7-9c47-4e6f-b601-d0392bdd98d2,Namespace:kube-system,Attempt:0,} returns sandbox id \"70036b31dcb16a87c8f591bf6358b1b8f0e738421d8a60ed39b3de0ad844c60e\"" May 13 00:39:21.683528 kubelet[1454]: E0513 00:39:21.683072 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:21.685878 kubelet[1454]: E0513 00:39:21.685843 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:22.402570 kubelet[1454]: E0513 00:39:22.402502 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:23.403445 kubelet[1454]: E0513 00:39:23.403408 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:23.448201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2114204732.mount: Deactivated successfully. May 13 00:39:23.685636 kubelet[1454]: E0513 00:39:23.685503 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:23.757428 env[1206]: time="2025-05-13T00:39:23.757375854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:23.759125 env[1206]: time="2025-05-13T00:39:23.759098147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:23.760721 env[1206]: time="2025-05-13T00:39:23.760698149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:23.762131 env[1206]: time="2025-05-13T00:39:23.762102627Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:23.762480 env[1206]: time="2025-05-13T00:39:23.762453761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:39:23.763588 env[1206]: time="2025-05-13T00:39:23.763464256Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 00:39:23.764348 env[1206]: time="2025-05-13T00:39:23.764325343Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:39:23.780230 env[1206]: time="2025-05-13T00:39:23.780172120Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea\"" May 13 00:39:23.780949 env[1206]: time="2025-05-13T00:39:23.780923922Z" level=info msg="StartContainer for \"df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea\"" May 13 00:39:23.817191 systemd[1]: Started cri-containerd-df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea.scope. May 13 00:39:23.836982 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 00:39:23.837117 kernel: audit: type=1400 audit(1747096763.834:438): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7582bfc208 items=0 ppid=1567 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:23.846365 kernel: audit: type=1300 audit(1747096763.834:438): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7582bfc208 items=0 ppid=1567 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:23.846444 kernel: audit: type=1327 audit(1747096763.834:438): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306532336164366661623338376432313538653933353135373161 May 13 00:39:23.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306532336164366661623338376432313538653933353135373161 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.854975 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.855107 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.861532 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.861583 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.868123 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.868173 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.874869 kernel: audit: type=1400 audit(1747096763.834:439): avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.834000 audit: BPF prog-id=63 op=LOAD May 13 00:39:23.834000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e9e78 items=0 ppid=1567 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:23.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306532336164366661623338376432313538653933353135373161 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.839000 audit: BPF prog-id=64 op=LOAD May 13 00:39:23.839000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e9ec8 items=0 ppid=1567 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:23.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306532336164366661623338376432313538653933353135373161 May 13 00:39:23.850000 audit: BPF prog-id=64 op=UNLOAD May 13 00:39:23.850000 audit: BPF prog-id=63 op=UNLOAD May 13 00:39:23.850000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:23.850000 audit: BPF prog-id=65 op=LOAD May 13 00:39:23.850000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e9f58 items=0 ppid=1567 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:23.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306532336164366661623338376432313538653933353135373161 May 13 00:39:23.876013 env[1206]: time="2025-05-13T00:39:23.875946957Z" level=info msg="StartContainer for \"df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea\" returns successfully" May 13 00:39:23.883295 systemd[1]: cri-containerd-df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea.scope: Deactivated successfully. May 13 00:39:23.888000 audit: BPF prog-id=65 op=UNLOAD May 13 00:39:23.962970 env[1206]: time="2025-05-13T00:39:23.962855772Z" level=info msg="shim disconnected" id=df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea May 13 00:39:23.962970 env[1206]: time="2025-05-13T00:39:23.962892627Z" level=warning msg="cleaning up after shim disconnected" id=df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea namespace=k8s.io May 13 00:39:23.962970 env[1206]: time="2025-05-13T00:39:23.962900394Z" level=info msg="cleaning up dead shim" May 13 00:39:23.969482 env[1206]: time="2025-05-13T00:39:23.969456271Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:39:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1685 runtime=io.containerd.runc.v2\n" May 13 00:39:24.404242 kubelet[1454]: E0513 00:39:24.404118 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:24.696084 kubelet[1454]: E0513 00:39:24.695961 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:24.775506 systemd[1]: run-containerd-runc-k8s.io-df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea-runc.2CxxFB.mount: Deactivated successfully. May 13 00:39:24.775588 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-df0e23ad6fab387d2158e9351571a6891149bb85525d67ed29cb70834adee6ea-rootfs.mount: Deactivated successfully. May 13 00:39:24.981448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211378876.mount: Deactivated successfully. May 13 00:39:25.405098 kubelet[1454]: E0513 00:39:25.404945 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:25.682347 env[1206]: time="2025-05-13T00:39:25.682238788Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:25.684299 env[1206]: time="2025-05-13T00:39:25.684258370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:25.685700 env[1206]: time="2025-05-13T00:39:25.685674149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:25.686089 kubelet[1454]: E0513 00:39:25.686015 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:25.687138 env[1206]: time="2025-05-13T00:39:25.687102163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:25.687495 env[1206]: time="2025-05-13T00:39:25.687464322Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 00:39:25.688437 env[1206]: time="2025-05-13T00:39:25.688411414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:39:25.689245 env[1206]: time="2025-05-13T00:39:25.689216618Z" level=info msg="CreateContainer within sandbox \"70036b31dcb16a87c8f591bf6358b1b8f0e738421d8a60ed39b3de0ad844c60e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:39:25.703646 env[1206]: time="2025-05-13T00:39:25.703608418Z" level=info msg="CreateContainer within sandbox \"70036b31dcb16a87c8f591bf6358b1b8f0e738421d8a60ed39b3de0ad844c60e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"81c13007baa8fcee20a78bfa33889403f601c2ef5c1a6d923f1c17aee1687ffe\"" May 13 00:39:25.703947 env[1206]: time="2025-05-13T00:39:25.703895573Z" level=info msg="StartContainer for \"81c13007baa8fcee20a78bfa33889403f601c2ef5c1a6d923f1c17aee1687ffe\"" May 13 00:39:25.729827 systemd[1]: Started cri-containerd-81c13007baa8fcee20a78bfa33889403f601c2ef5c1a6d923f1c17aee1687ffe.scope. May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f733a8dbcf8 items=0 ppid=1577 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633133303037626161386663656532306137386266613333383839 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit: BPF prog-id=66 op=LOAD May 13 00:39:25.760000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000097168 items=0 ppid=1577 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633133303037626161386663656532306137386266613333383839 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit: BPF prog-id=67 op=LOAD May 13 00:39:25.760000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000971b8 items=0 ppid=1577 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633133303037626161386663656532306137386266613333383839 May 13 00:39:25.760000 audit: BPF prog-id=67 op=UNLOAD May 13 00:39:25.760000 audit: BPF prog-id=66 op=UNLOAD May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:25.760000 audit: BPF prog-id=68 op=LOAD May 13 00:39:25.760000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000097248 items=0 ppid=1577 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633133303037626161386663656532306137386266613333383839 May 13 00:39:25.775247 env[1206]: time="2025-05-13T00:39:25.775172259Z" level=info msg="StartContainer for \"81c13007baa8fcee20a78bfa33889403f601c2ef5c1a6d923f1c17aee1687ffe\" returns successfully" May 13 00:39:25.860000 audit[1773]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:25.860000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc597f64d0 a2=0 a3=7ffc597f64bc items=0 ppid=1721 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:39:25.860000 audit[1772]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.860000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc0c12390 a2=0 a3=7fffc0c1237c items=0 ppid=1721 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:39:25.861000 audit[1774]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.861000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb1e19340 a2=0 a3=7ffcb1e1932c items=0 ppid=1721 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:39:25.861000 audit[1775]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:25.861000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5a8fa100 a2=0 a3=7ffe5a8fa0ec items=0 ppid=1721 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:39:25.862000 audit[1776]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.862000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5784d4c0 a2=0 a3=7ffd5784d4ac items=0 ppid=1721 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:39:25.863000 audit[1777]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:25.863000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4fd79890 a2=0 a3=7fff4fd7987c items=0 ppid=1721 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:39:25.962000 audit[1778]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.962000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9a3a36e0 a2=0 a3=7ffd9a3a36cc items=0 ppid=1721 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:39:25.965000 audit[1780]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.965000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc40312b90 a2=0 a3=7ffc40312b7c items=0 ppid=1721 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:39:25.967000 audit[1783]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.967000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc0c0fe30 a2=0 a3=7fffc0c0fe1c items=0 ppid=1721 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:39:25.968000 audit[1784]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.968000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3352dab0 a2=0 a3=7ffd3352da9c items=0 ppid=1721 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:39:25.970000 audit[1786]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.970000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc4900f20 a2=0 a3=7ffcc4900f0c items=0 ppid=1721 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:39:25.971000 audit[1787]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.971000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1d3e1660 a2=0 a3=7ffd1d3e164c items=0 ppid=1721 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:39:25.973000 audit[1789]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.973000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea2a1c6d0 a2=0 a3=7ffea2a1c6bc items=0 ppid=1721 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:39:25.975000 audit[1792]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.975000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea88f7420 a2=0 a3=7ffea88f740c items=0 ppid=1721 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:39:25.976000 audit[1793]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.976000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa2f34c0 a2=0 a3=7ffeaa2f34ac items=0 ppid=1721 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:39:25.978000 audit[1795]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.978000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8bbcab40 a2=0 a3=7ffc8bbcab2c items=0 ppid=1721 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:39:25.979000 audit[1796]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.979000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf6a60910 a2=0 a3=7ffdf6a608fc items=0 ppid=1721 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:39:25.981000 audit[1798]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.981000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6681a9d0 a2=0 a3=7ffd6681a9bc items=0 ppid=1721 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:25.983000 audit[1801]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.983000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff58ccb6b0 a2=0 a3=7fff58ccb69c items=0 ppid=1721 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:25.986000 audit[1804]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.986000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1a8890c0 a2=0 a3=7ffe1a8890ac items=0 ppid=1721 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:39:25.987000 audit[1805]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.987000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd94c32fe0 a2=0 a3=7ffd94c32fcc items=0 ppid=1721 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:39:25.988000 audit[1807]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:25.988000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2b036580 a2=0 a3=7ffe2b03656c items=0 ppid=1721 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:25.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:26.007000 audit[1811]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:26.007000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff949a7700 a2=0 a3=7fff949a76ec items=0 ppid=1721 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:26.008000 audit[1812]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:26.008000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcba1eba80 a2=0 a3=7ffcba1eba6c items=0 ppid=1721 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:39:26.010000 audit[1814]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:26.010000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd9dee9640 a2=0 a3=7ffd9dee962c items=0 ppid=1721 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:39:26.028000 audit[1820]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:26.028000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff0936f310 a2=0 a3=7fff0936f2fc items=0 ppid=1721 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:26.044000 audit[1820]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:26.044000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7fff0936f310 a2=0 a3=7fff0936f2fc items=0 ppid=1721 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:26.045000 audit[1827]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.045000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef43a1290 a2=0 a3=7ffef43a127c items=0 ppid=1721 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:39:26.047000 audit[1829]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.047000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7bad3b00 a2=0 a3=7ffc7bad3aec items=0 ppid=1721 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:39:26.050000 audit[1832]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.050000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff3dc2bf30 a2=0 a3=7fff3dc2bf1c items=0 ppid=1721 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:39:26.050000 audit[1833]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.050000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9f5c1420 a2=0 a3=7ffe9f5c140c items=0 ppid=1721 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:39:26.052000 audit[1835]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.052000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc63c30bb0 a2=0 a3=7ffc63c30b9c items=0 ppid=1721 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:39:26.053000 audit[1836]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.053000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0a6b7410 a2=0 a3=7ffd0a6b73fc items=0 ppid=1721 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:39:26.056000 audit[1838]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.056000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa6abe670 a2=0 a3=7fffa6abe65c items=0 ppid=1721 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:39:26.059000 audit[1841]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.059000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff32736340 a2=0 a3=7fff3273632c items=0 ppid=1721 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:39:26.060000 audit[1842]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.060000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc457161a0 a2=0 a3=7ffc4571618c items=0 ppid=1721 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:39:26.062000 audit[1844]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.062000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4462aee0 a2=0 a3=7ffc4462aecc items=0 ppid=1721 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:39:26.062000 audit[1845]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.062000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe526bcc90 a2=0 a3=7ffe526bcc7c items=0 ppid=1721 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:39:26.065000 audit[1847]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.065000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd331122a0 a2=0 a3=7ffd3311228c items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:26.067000 audit[1850]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.067000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd4ff9420 a2=0 a3=7ffcd4ff940c items=0 ppid=1721 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:39:26.070000 audit[1853]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.070000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1d1af450 a2=0 a3=7fff1d1af43c items=0 ppid=1721 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:39:26.071000 audit[1854]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.071000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1ab17f40 a2=0 a3=7fff1ab17f2c items=0 ppid=1721 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:39:26.073000 audit[1856]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.073000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff76bf4810 a2=0 a3=7fff76bf47fc items=0 ppid=1721 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:26.075000 audit[1859]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.075000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff5cfa48c0 a2=0 a3=7fff5cfa48ac items=0 ppid=1721 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:26.076000 audit[1860]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.076000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef14a02a0 a2=0 a3=7ffef14a028c items=0 ppid=1721 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:39:26.077000 audit[1862]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.077000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8923caa0 a2=0 a3=7ffe8923ca8c items=0 ppid=1721 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:39:26.078000 audit[1863]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.078000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6ca548e0 a2=0 a3=7ffc6ca548cc items=0 ppid=1721 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:39:26.080000 audit[1865]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.080000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9eebbb00 a2=0 a3=7fff9eebbaec items=0 ppid=1721 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:26.082000 audit[1868]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:26.082000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb4b71860 a2=0 a3=7ffdb4b7184c items=0 ppid=1721 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:26.084000 audit[1870]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:39:26.084000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd3bb728a0 a2=0 a3=7ffd3bb7288c items=0 ppid=1721 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.084000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:26.085000 audit[1870]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:39:26.085000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd3bb728a0 a2=0 a3=7ffd3bb7288c items=0 ppid=1721 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:26.085000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:26.406037 kubelet[1454]: E0513 00:39:26.405904 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:26.699682 kubelet[1454]: E0513 00:39:26.699576 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:26.707700 kubelet[1454]: I0513 00:39:26.707646 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2x4n9" podStartSLOduration=4.703132025 podStartE2EDuration="8.707634783s" podCreationTimestamp="2025-05-13 00:39:18 +0000 UTC" firstStartedPulling="2025-05-13 00:39:21.683714862 +0000 UTC m=+3.602759201" lastFinishedPulling="2025-05-13 00:39:25.68821762 +0000 UTC m=+7.607261959" observedRunningTime="2025-05-13 00:39:26.707447182 +0000 UTC m=+8.626491521" watchObservedRunningTime="2025-05-13 00:39:26.707634783 +0000 UTC m=+8.626679132" May 13 00:39:27.407069 kubelet[1454]: E0513 00:39:27.406991 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:27.686114 kubelet[1454]: E0513 00:39:27.685897 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:27.701659 kubelet[1454]: E0513 00:39:27.701604 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:28.408115 kubelet[1454]: E0513 00:39:28.408037 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:29.409008 kubelet[1454]: E0513 00:39:29.408948 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:29.686735 kubelet[1454]: E0513 00:39:29.686115 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:30.410006 kubelet[1454]: E0513 00:39:30.409955 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:31.410837 kubelet[1454]: E0513 00:39:31.410751 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:31.685682 kubelet[1454]: E0513 00:39:31.685473 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:31.832777 env[1206]: time="2025-05-13T00:39:31.832678911Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:31.836544 env[1206]: time="2025-05-13T00:39:31.836255391Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:31.841122 env[1206]: time="2025-05-13T00:39:31.841003370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:31.843650 env[1206]: time="2025-05-13T00:39:31.843515834Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:31.845461 env[1206]: time="2025-05-13T00:39:31.844450463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:39:31.854546 env[1206]: time="2025-05-13T00:39:31.854387847Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:39:31.880242 env[1206]: time="2025-05-13T00:39:31.880164000Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0\"" May 13 00:39:31.883455 env[1206]: time="2025-05-13T00:39:31.882032144Z" level=info msg="StartContainer for \"ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0\"" May 13 00:39:31.913561 systemd[1]: Started cri-containerd-ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0.scope. May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.941597 kernel: kauditd_printk_skb: 230 callbacks suppressed May 13 00:39:31.941700 kernel: audit: type=1400 audit(1747096771.939:502): avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd070cef3b8 items=0 ppid=1567 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:31.951238 kernel: audit: type=1300 audit(1747096771.939:502): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd070cef3b8 items=0 ppid=1567 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:31.951366 kernel: audit: type=1327 audit(1747096771.939:502): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313465363036383338333863383365363064653637616363366233 May 13 00:39:31.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313465363036383338333863383365363064653637616363366233 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.959893 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.960005 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.966991 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.967098 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.974276 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.974352 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.977983 kernel: audit: type=1400 audit(1747096771.939:503): avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.939000 audit: BPF prog-id=69 op=LOAD May 13 00:39:31.939000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000238208 items=0 ppid=1567 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:31.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313465363036383338333863383365363064653637616363366233 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.940000 audit: BPF prog-id=70 op=LOAD May 13 00:39:31.940000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000238258 items=0 ppid=1567 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:31.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313465363036383338333863383365363064653637616363366233 May 13 00:39:31.944000 audit: BPF prog-id=70 op=UNLOAD May 13 00:39:31.944000 audit: BPF prog-id=69 op=UNLOAD May 13 00:39:31.944000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:31.944000 audit: BPF prog-id=71 op=LOAD May 13 00:39:31.944000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002382e8 items=0 ppid=1567 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:31.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313465363036383338333863383365363064653637616363366233 May 13 00:39:32.005299 env[1206]: time="2025-05-13T00:39:32.005214189Z" level=info msg="StartContainer for \"ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0\" returns successfully" May 13 00:39:32.411593 kubelet[1454]: E0513 00:39:32.411463 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:32.711119 kubelet[1454]: E0513 00:39:32.710993 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:33.054426 systemd[1]: cri-containerd-ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0.scope: Deactivated successfully. May 13 00:39:33.058000 audit: BPF prog-id=71 op=UNLOAD May 13 00:39:33.059934 kubelet[1454]: I0513 00:39:33.059919 1454 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 00:39:33.069735 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0-rootfs.mount: Deactivated successfully. May 13 00:39:33.388032 env[1206]: time="2025-05-13T00:39:33.387881667Z" level=info msg="shim disconnected" id=ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0 May 13 00:39:33.388032 env[1206]: time="2025-05-13T00:39:33.387941214Z" level=warning msg="cleaning up after shim disconnected" id=ee14e60683838c83e60de67acc6b359e2e42aa3a84a0b927ac56aadbd7184ba0 namespace=k8s.io May 13 00:39:33.388032 env[1206]: time="2025-05-13T00:39:33.387955173Z" level=info msg="cleaning up dead shim" May 13 00:39:33.394991 env[1206]: time="2025-05-13T00:39:33.394945554Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:39:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1919 runtime=io.containerd.runc.v2\n" May 13 00:39:33.412342 kubelet[1454]: E0513 00:39:33.412285 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:33.689377 systemd[1]: Created slice kubepods-besteffort-pod2f5de204_aa00_4a75_a752_0e7e97211ab2.slice. May 13 00:39:33.691724 env[1206]: time="2025-05-13T00:39:33.691673235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cjlrr,Uid:2f5de204-aa00-4a75-a752-0e7e97211ab2,Namespace:calico-system,Attempt:0,}" May 13 00:39:33.713495 kubelet[1454]: E0513 00:39:33.713464 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:33.714146 env[1206]: time="2025-05-13T00:39:33.714099014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:39:33.753142 env[1206]: time="2025-05-13T00:39:33.753027547Z" level=error msg="Failed to destroy network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:33.753561 env[1206]: time="2025-05-13T00:39:33.753513997Z" level=error msg="encountered an error cleaning up failed sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:33.753622 env[1206]: time="2025-05-13T00:39:33.753585118Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cjlrr,Uid:2f5de204-aa00-4a75-a752-0e7e97211ab2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:33.753883 kubelet[1454]: E0513 00:39:33.753827 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:33.754105 kubelet[1454]: E0513 00:39:33.753902 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:33.754105 kubelet[1454]: E0513 00:39:33.753924 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cjlrr" May 13 00:39:33.754105 kubelet[1454]: E0513 00:39:33.753978 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-cjlrr_calico-system(2f5de204-aa00-4a75-a752-0e7e97211ab2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-cjlrr_calico-system(2f5de204-aa00-4a75-a752-0e7e97211ab2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:33.754902 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273-shm.mount: Deactivated successfully. May 13 00:39:33.807000 audit[1967]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.807000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd631420e0 a2=0 a3=7ffd631420cc items=0 ppid=1721 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.812000 audit[1967]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.812000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd631420e0 a2=0 a3=0 items=0 ppid=1721 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.824000 audit[1969]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.824000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc4ee11ca0 a2=0 a3=7ffc4ee11c8c items=0 ppid=1721 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.829000 audit[1969]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.829000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc4ee11ca0 a2=0 a3=7ffc4ee11c8c items=0 ppid=1721 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:34.412821 kubelet[1454]: E0513 00:39:34.412742 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:34.715157 kubelet[1454]: I0513 00:39:34.715038 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:34.715811 env[1206]: time="2025-05-13T00:39:34.715771365Z" level=info msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" May 13 00:39:34.739347 env[1206]: time="2025-05-13T00:39:34.739268296Z" level=error msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" failed" error="failed to destroy network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:34.739602 kubelet[1454]: E0513 00:39:34.739546 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:34.739665 kubelet[1454]: E0513 00:39:34.739613 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273"} May 13 00:39:34.739726 kubelet[1454]: E0513 00:39:34.739669 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f5de204-aa00-4a75-a752-0e7e97211ab2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:34.739726 kubelet[1454]: E0513 00:39:34.739698 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f5de204-aa00-4a75-a752-0e7e97211ab2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cjlrr" podUID="2f5de204-aa00-4a75-a752-0e7e97211ab2" May 13 00:39:35.218955 systemd[1]: Created slice kubepods-besteffort-podec0eaed8_7365_4aec_98ce_507476f15d59.slice. May 13 00:39:35.246668 kubelet[1454]: I0513 00:39:35.246259 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmzx8\" (UniqueName: \"kubernetes.io/projected/ec0eaed8-7365-4aec-98ce-507476f15d59-kube-api-access-hmzx8\") pod \"nginx-deployment-8587fbcb89-2qdgs\" (UID: \"ec0eaed8-7365-4aec-98ce-507476f15d59\") " pod="default/nginx-deployment-8587fbcb89-2qdgs" May 13 00:39:35.413018 kubelet[1454]: E0513 00:39:35.412860 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:35.527529 env[1206]: time="2025-05-13T00:39:35.527393426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-2qdgs,Uid:ec0eaed8-7365-4aec-98ce-507476f15d59,Namespace:default,Attempt:0,}" May 13 00:39:35.653001 env[1206]: time="2025-05-13T00:39:35.652929322Z" level=error msg="Failed to destroy network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:35.653366 env[1206]: time="2025-05-13T00:39:35.653327173Z" level=error msg="encountered an error cleaning up failed sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:35.653415 env[1206]: time="2025-05-13T00:39:35.653372392Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-2qdgs,Uid:ec0eaed8-7365-4aec-98ce-507476f15d59,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:35.653610 kubelet[1454]: E0513 00:39:35.653571 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:35.653673 kubelet[1454]: E0513 00:39:35.653636 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-2qdgs" May 13 00:39:35.653673 kubelet[1454]: E0513 00:39:35.653655 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-2qdgs" May 13 00:39:35.653747 kubelet[1454]: E0513 00:39:35.653697 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-2qdgs_default(ec0eaed8-7365-4aec-98ce-507476f15d59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-2qdgs_default(ec0eaed8-7365-4aec-98ce-507476f15d59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-2qdgs" podUID="ec0eaed8-7365-4aec-98ce-507476f15d59" May 13 00:39:35.654627 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9-shm.mount: Deactivated successfully. May 13 00:39:35.717608 kubelet[1454]: I0513 00:39:35.717570 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:35.718270 env[1206]: time="2025-05-13T00:39:35.718206855Z" level=info msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" May 13 00:39:35.758215 env[1206]: time="2025-05-13T00:39:35.758136010Z" level=error msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" failed" error="failed to destroy network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:35.758414 kubelet[1454]: E0513 00:39:35.758373 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:35.758479 kubelet[1454]: E0513 00:39:35.758429 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9"} May 13 00:39:35.758479 kubelet[1454]: E0513 00:39:35.758463 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ec0eaed8-7365-4aec-98ce-507476f15d59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:35.758580 kubelet[1454]: E0513 00:39:35.758484 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ec0eaed8-7365-4aec-98ce-507476f15d59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-2qdgs" podUID="ec0eaed8-7365-4aec-98ce-507476f15d59" May 13 00:39:36.414016 kubelet[1454]: E0513 00:39:36.413922 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:37.129000 audit[2058]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.131624 kernel: kauditd_printk_skb: 46 callbacks suppressed May 13 00:39:37.131683 kernel: audit: type=1325 audit(1747096777.129:513): table=filter:69 family=2 entries=10 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.129000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcec3a8b40 a2=0 a3=7ffcec3a8b2c items=0 ppid=1721 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.140528 kernel: audit: type=1300 audit(1747096777.129:513): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcec3a8b40 a2=0 a3=7ffcec3a8b2c items=0 ppid=1721 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.140595 kernel: audit: type=1327 audit(1747096777.129:513): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.148000 audit[2058]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.148000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcec3a8b40 a2=0 a3=7ffcec3a8b2c items=0 ppid=1721 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.157272 kernel: audit: type=1325 audit(1747096777.148:514): table=nat:70 family=2 entries=44 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.157345 kernel: audit: type=1300 audit(1747096777.148:514): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcec3a8b40 a2=0 a3=7ffcec3a8b2c items=0 ppid=1721 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.157381 kernel: audit: type=1327 audit(1747096777.148:514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.164000 audit[2060]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.164000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbb638530 a2=0 a3=7fffbb63851c items=0 ppid=1721 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.176945 kernel: audit: type=1325 audit(1747096777.164:515): table=filter:71 family=2 entries=10 op=nft_register_rule pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.177027 kernel: audit: type=1300 audit(1747096777.164:515): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbb638530 a2=0 a3=7fffbb63851c items=0 ppid=1721 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.177090 kernel: audit: type=1327 audit(1747096777.164:515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.191000 audit[2060]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.191000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffbb638530 a2=0 a3=7fffbb63851c items=0 ppid=1721 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.198135 kernel: audit: type=1325 audit(1747096777.191:516): table=nat:72 family=2 entries=56 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.414936 kubelet[1454]: E0513 00:39:37.414809 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:38.400900 kubelet[1454]: E0513 00:39:38.400844 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:38.415506 kubelet[1454]: E0513 00:39:38.415486 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:38.836000 audit[2065]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:38.836000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc3705f5e0 a2=0 a3=7ffc3705f5cc items=0 ppid=1721 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:38.846000 audit[2065]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:38.846000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc3705f5e0 a2=0 a3=7ffc3705f5cc items=0 ppid=1721 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.416056 kubelet[1454]: E0513 00:39:39.415969 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:39.858000 audit[2067]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.858000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffec8599800 a2=0 a3=7ffec85997ec items=0 ppid=1721 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.872000 audit[2067]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.872000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffec8599800 a2=0 a3=7ffec85997ec items=0 ppid=1721 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:40.416551 kubelet[1454]: E0513 00:39:40.416490 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:41.417380 kubelet[1454]: E0513 00:39:41.417290 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:42.029187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3786620891.mount: Deactivated successfully. May 13 00:39:42.417717 kubelet[1454]: E0513 00:39:42.417639 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:42.659456 env[1206]: time="2025-05-13T00:39:42.659378482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:42.661972 env[1206]: time="2025-05-13T00:39:42.661933195Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:42.663878 env[1206]: time="2025-05-13T00:39:42.663827263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:42.665385 env[1206]: time="2025-05-13T00:39:42.665343122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:42.665783 env[1206]: time="2025-05-13T00:39:42.665748825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:39:42.675601 env[1206]: time="2025-05-13T00:39:42.675469959Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:39:42.694475 env[1206]: time="2025-05-13T00:39:42.694389819Z" level=info msg="CreateContainer within sandbox \"a8d9320046ec54dde4c3054a0b68012b2f5cb40f108236afbefb92d73dda8947\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"aa2401843ca5c75d101746513551e7b600eb904cd04faa2a0ba70b1003062540\"" May 13 00:39:42.694913 env[1206]: time="2025-05-13T00:39:42.694875066Z" level=info msg="StartContainer for \"aa2401843ca5c75d101746513551e7b600eb904cd04faa2a0ba70b1003062540\"" May 13 00:39:42.709826 systemd[1]: Started cri-containerd-aa2401843ca5c75d101746513551e7b600eb904cd04faa2a0ba70b1003062540.scope. May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.729226 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 00:39:42.729304 kernel: audit: type=1400 audit(1747096782.727:521): avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe7534af018 items=0 ppid=1567 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.739465 kernel: audit: type=1300 audit(1747096782.727:521): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe7534af018 items=0 ppid=1567 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.739515 kernel: audit: type=1327 audit(1747096782.727:521): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323430313834336361356337356431303137343635313335353165 May 13 00:39:42.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323430313834336361356337356431303137343635313335353165 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.748913 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.748983 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.756857 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.756901 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.760410 env[1206]: time="2025-05-13T00:39:42.760377589Z" level=info msg="StartContainer for \"aa2401843ca5c75d101746513551e7b600eb904cd04faa2a0ba70b1003062540\" returns successfully" May 13 00:39:42.763181 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.767992 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.768210 kernel: audit: type=1400 audit(1747096782.727:522): avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.727000 audit: BPF prog-id=72 op=LOAD May 13 00:39:42.727000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb318 items=0 ppid=1567 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323430313834336361356337356431303137343635313335353165 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.732000 audit: BPF prog-id=73 op=LOAD May 13 00:39:42.732000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fb368 items=0 ppid=1567 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323430313834336361356337356431303137343635313335353165 May 13 00:39:42.738000 audit: BPF prog-id=73 op=UNLOAD May 13 00:39:42.738000 audit: BPF prog-id=72 op=UNLOAD May 13 00:39:42.738000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.738000 audit: BPF prog-id=74 op=LOAD May 13 00:39:42.738000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb3f8 items=0 ppid=1567 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323430313834336361356337356431303137343635313335353165 May 13 00:39:42.826399 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:39:42.826527 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:39:43.418486 kubelet[1454]: E0513 00:39:43.418433 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:43.736922 kubelet[1454]: E0513 00:39:43.736776 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:44.029000 audit[2224]: AVC avc: denied { write } for pid=2224 comm="tee" name="fd" dev="proc" ino=20132 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.029000 audit[2224]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd3aa0a2a a2=241 a3=1b6 items=1 ppid=2187 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.029000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:39:44.029000 audit: PATH item=0 name="/dev/fd/63" inode=20129 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.029000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.030000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=21630 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.030000 audit[2206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc87b2ca2b a2=241 a3=1b6 items=1 ppid=2171 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.030000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:39:44.030000 audit: PATH item=0 name="/dev/fd/63" inode=21623 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.034000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=21635 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.034000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe819f7a2c a2=241 a3=1b6 items=1 ppid=2175 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.034000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:39:44.034000 audit: PATH item=0 name="/dev/fd/63" inode=20128 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.045000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=20618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.045000 audit[2232]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef6253a2a a2=241 a3=1b6 items=1 ppid=2169 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.045000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:39:44.045000 audit: PATH item=0 name="/dev/fd/63" inode=20611 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.051000 audit[2235]: AVC avc: denied { write } for pid=2235 comm="tee" name="fd" dev="proc" ino=20622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.051000 audit[2235]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc79aefa1a a2=241 a3=1b6 items=1 ppid=2179 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.051000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:39:44.051000 audit: PATH item=0 name="/dev/fd/63" inode=20614 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.051000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.052000 audit[2200]: AVC avc: denied { write } for pid=2200 comm="tee" name="fd" dev="proc" ino=20140 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.052000 audit[2200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea2985a1b a2=241 a3=1b6 items=1 ppid=2168 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.052000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:39:44.052000 audit: PATH item=0 name="/dev/fd/63" inode=20604 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.052000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.059000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=20144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:44.059000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6b2bfa2a a2=241 a3=1b6 items=1 ppid=2181 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.059000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:39:44.059000 audit: PATH item=0 name="/dev/fd/63" inode=20137 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:44.059000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.142000 audit: BPF prog-id=75 op=LOAD May 13 00:39:44.142000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea6d776e0 a2=98 a3=3 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.142000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.142000 audit: BPF prog-id=75 op=UNLOAD May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit: BPF prog-id=76 op=LOAD May 13 00:39:44.143000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6d774c0 a2=74 a3=540051 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.143000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.143000 audit: BPF prog-id=76 op=UNLOAD May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.143000 audit: BPF prog-id=77 op=LOAD May 13 00:39:44.143000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6d774f0 a2=94 a3=2 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.143000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.143000 audit: BPF prog-id=77 op=UNLOAD May 13 00:39:44.252000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit: BPF prog-id=78 op=LOAD May 13 00:39:44.252000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6d773b0 a2=40 a3=1 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.252000 audit: BPF prog-id=78 op=UNLOAD May 13 00:39:44.252000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.252000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea6d77480 a2=50 a3=7ffea6d77560 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d773c0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6d773f0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6d77300 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d77410 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d773f0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d773e0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d77410 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6d773f0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6d77410 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6d773e0 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6d77450 a2=28 a3=0 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea6d77200 a2=50 a3=1 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit: BPF prog-id=79 op=LOAD May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea6d77200 a2=94 a3=5 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit: BPF prog-id=79 op=UNLOAD May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea6d772b0 a2=50 a3=1 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffea6d773d0 a2=4 a3=38 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.260000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.260000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6d77420 a2=94 a3=6 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.260000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.261000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6d76bd0 a2=94 a3=83 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.261000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.261000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6d76bd0 a2=94 a3=83 items=0 ppid=2182 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit: BPF prog-id=80 op=LOAD May 13 00:39:44.267000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08b4260 a2=98 a3=1999999999999999 items=0 ppid=2182 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:44.267000 audit: BPF prog-id=80 op=UNLOAD May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit: BPF prog-id=81 op=LOAD May 13 00:39:44.267000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08b4140 a2=74 a3=ffff items=0 ppid=2182 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:44.267000 audit: BPF prog-id=81 op=UNLOAD May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.267000 audit: BPF prog-id=82 op=LOAD May 13 00:39:44.267000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08b4180 a2=40 a3=7ffcb08b4360 items=0 ppid=2182 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:44.267000 audit: BPF prog-id=82 op=UNLOAD May 13 00:39:44.309221 systemd-networkd[1033]: vxlan.calico: Link UP May 13 00:39:44.309227 systemd-networkd[1033]: vxlan.calico: Gained carrier May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit: BPF prog-id=83 op=LOAD May 13 00:39:44.331000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd3ee23b0 a2=98 a3=ffffffff items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.331000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.331000 audit: BPF prog-id=83 op=UNLOAD May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.331000 audit: BPF prog-id=84 op=LOAD May 13 00:39:44.331000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd3ee21c0 a2=74 a3=540051 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.331000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit: BPF prog-id=84 op=UNLOAD May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit: BPF prog-id=85 op=LOAD May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd3ee21f0 a2=94 a3=2 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit: BPF prog-id=85 op=UNLOAD May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee20c0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3ee20f0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3ee2000 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee2110 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee20f0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee20e0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee2110 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3ee20f0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3ee2110 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3ee20e0 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd3ee2150 a2=28 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit: BPF prog-id=86 op=LOAD May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd3ee1fc0 a2=40 a3=0 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit: BPF prog-id=86 op=UNLOAD May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdd3ee1fb0 a2=50 a3=2800 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdd3ee1fb0 a2=50 a3=2800 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.332000 audit: BPF prog-id=87 op=LOAD May 13 00:39:44.332000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd3ee17d0 a2=94 a3=2 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.333000 audit: BPF prog-id=87 op=UNLOAD May 13 00:39:44.333000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.333000 audit: BPF prog-id=88 op=LOAD May 13 00:39:44.333000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd3ee18d0 a2=94 a3=30 items=0 ppid=2182 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.334000 audit: BPF prog-id=89 op=LOAD May 13 00:39:44.334000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd80b7b320 a2=98 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.334000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.335000 audit: BPF prog-id=89 op=UNLOAD May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit: BPF prog-id=90 op=LOAD May 13 00:39:44.335000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b7b100 a2=74 a3=540051 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.335000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.335000 audit: BPF prog-id=90 op=UNLOAD May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.335000 audit: BPF prog-id=91 op=LOAD May 13 00:39:44.335000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b7b130 a2=94 a3=2 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.335000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.335000 audit: BPF prog-id=91 op=UNLOAD May 13 00:39:44.418895 kubelet[1454]: E0513 00:39:44.418831 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:44.440000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit: BPF prog-id=92 op=LOAD May 13 00:39:44.440000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b7aff0 a2=40 a3=1 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.440000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.440000 audit: BPF prog-id=92 op=UNLOAD May 13 00:39:44.440000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.440000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd80b7b0c0 a2=50 a3=7ffd80b7b1a0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.440000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.447000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.447000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b000 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.447000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b7b030 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b7af40 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b050 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b030 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b020 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b050 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b7b030 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b7b050 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b7b020 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b7b090 a2=28 a3=0 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd80b7ae40 a2=50 a3=1 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit: BPF prog-id=93 op=LOAD May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd80b7ae40 a2=94 a3=5 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit: BPF prog-id=93 op=UNLOAD May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd80b7aef0 a2=50 a3=1 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd80b7b010 a2=4 a3=38 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b7b060 a2=94 a3=6 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b7a810 a2=94 a3=83 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.448000 audit[2320]: AVC avc: denied { confidentiality } for pid=2320 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:44.448000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b7a810 a2=94 a3=83 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.449000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.449000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd80b7c250 a2=10 a3=208 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.449000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.449000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd80b7c0f0 a2=10 a3=3 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.449000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.449000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd80b7c090 a2=10 a3=3 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.449000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:44.449000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd80b7c090 a2=10 a3=7 items=0 ppid=2182 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:44.456000 audit: BPF prog-id=88 op=UNLOAD May 13 00:39:44.493000 audit[2348]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:44.493000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd99694440 a2=0 a3=7ffd9969442c items=0 ppid=2182 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.493000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:44.499000 audit[2347]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:44.499000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe90c16b00 a2=0 a3=7ffe90c16aec items=0 ppid=2182 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:44.499000 audit[2351]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:44.499000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffed177cb10 a2=0 a3=7ffed177cafc items=0 ppid=2182 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:44.501000 audit[2346]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:44.501000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcae189d20 a2=0 a3=7ffcae189d0c items=0 ppid=2182 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:44.501000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:44.739087 kubelet[1454]: E0513 00:39:44.738642 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:45.419958 kubelet[1454]: E0513 00:39:45.419896 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:46.241237 systemd-networkd[1033]: vxlan.calico: Gained IPv6LL May 13 00:39:46.420491 kubelet[1454]: E0513 00:39:46.420415 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:46.686285 env[1206]: time="2025-05-13T00:39:46.686246737Z" level=info msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" May 13 00:39:46.725276 kubelet[1454]: I0513 00:39:46.724913 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mb979" podStartSLOduration=7.723689199 podStartE2EDuration="28.724893021s" podCreationTimestamp="2025-05-13 00:39:18 +0000 UTC" firstStartedPulling="2025-05-13 00:39:21.665302897 +0000 UTC m=+3.584347226" lastFinishedPulling="2025-05-13 00:39:42.666506709 +0000 UTC m=+24.585551048" observedRunningTime="2025-05-13 00:39:43.750244599 +0000 UTC m=+25.669288938" watchObservedRunningTime="2025-05-13 00:39:46.724893021 +0000 UTC m=+28.643937350" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" iface="eth0" netns="/var/run/netns/cni-2ff7fa8c-3851-dc76-febb-15c73bd70eee" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" iface="eth0" netns="/var/run/netns/cni-2ff7fa8c-3851-dc76-febb-15c73bd70eee" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" iface="eth0" netns="/var/run/netns/cni-2ff7fa8c-3851-dc76-febb-15c73bd70eee" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.725 [INFO][2398] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.743 [INFO][2407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.743 [INFO][2407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.744 [INFO][2407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.749 [WARNING][2407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.749 [INFO][2407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.751 [INFO][2407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:46.754396 env[1206]: 2025-05-13 00:39:46.753 [INFO][2398] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:39:46.754869 env[1206]: time="2025-05-13T00:39:46.754552792Z" level=info msg="TearDown network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" successfully" May 13 00:39:46.754869 env[1206]: time="2025-05-13T00:39:46.754584663Z" level=info msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" returns successfully" May 13 00:39:46.755317 env[1206]: time="2025-05-13T00:39:46.755268525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-2qdgs,Uid:ec0eaed8-7365-4aec-98ce-507476f15d59,Namespace:default,Attempt:1,}" May 13 00:39:46.756027 systemd[1]: run-netns-cni\x2d2ff7fa8c\x2d3851\x2ddc76\x2dfebb\x2d15c73bd70eee.mount: Deactivated successfully. May 13 00:39:46.873692 systemd-networkd[1033]: cali84b836a445a: Link UP May 13 00:39:46.876461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:39:46.876692 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali84b836a445a: link becomes ready May 13 00:39:46.876536 systemd-networkd[1033]: cali84b836a445a: Gained carrier May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.810 [INFO][2415] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0 nginx-deployment-8587fbcb89- default ec0eaed8-7365-4aec-98ce-507476f15d59 1054 0 2025-05-13 00:39:35 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.28 nginx-deployment-8587fbcb89-2qdgs eth0 default [] [] [kns.default ksa.default.default] cali84b836a445a [] []}} ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.810 [INFO][2415] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.836 [INFO][2429] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" HandleID="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.846 [INFO][2429] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" HandleID="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004358a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"nginx-deployment-8587fbcb89-2qdgs", "timestamp":"2025-05-13 00:39:46.836128269 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.846 [INFO][2429] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.846 [INFO][2429] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.846 [INFO][2429] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.848 [INFO][2429] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.851 [INFO][2429] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.855 [INFO][2429] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.856 [INFO][2429] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.859 [INFO][2429] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.859 [INFO][2429] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.861 [INFO][2429] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855 May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.865 [INFO][2429] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.870 [INFO][2429] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.193/26] block=192.168.75.192/26 handle="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.870 [INFO][2429] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.193/26] handle="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" host="10.0.0.28" May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.870 [INFO][2429] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:46.886406 env[1206]: 2025-05-13 00:39:46.870 [INFO][2429] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.193/26] IPv6=[] ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" HandleID="k8s-pod-network.8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.872 [INFO][2415] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ec0eaed8-7365-4aec-98ce-507476f15d59", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-2qdgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali84b836a445a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.872 [INFO][2415] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.193/32] ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.872 [INFO][2415] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali84b836a445a ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.876 [INFO][2415] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.876 [INFO][2415] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ec0eaed8-7365-4aec-98ce-507476f15d59", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855", Pod:"nginx-deployment-8587fbcb89-2qdgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali84b836a445a", MAC:"ee:60:73:bb:ed:c1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:46.886956 env[1206]: 2025-05-13 00:39:46.884 [INFO][2415] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855" Namespace="default" Pod="nginx-deployment-8587fbcb89-2qdgs" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:39:46.894000 audit[2452]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:46.894000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffe9e27da00 a2=0 a3=7ffe9e27d9ec items=0 ppid=2182 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:46.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:47.209738 env[1206]: time="2025-05-13T00:39:47.209662172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:47.209738 env[1206]: time="2025-05-13T00:39:47.209697740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:47.209738 env[1206]: time="2025-05-13T00:39:47.209707389Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:47.209971 env[1206]: time="2025-05-13T00:39:47.209859270Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855 pid=2460 runtime=io.containerd.runc.v2 May 13 00:39:47.220679 systemd[1]: Started cri-containerd-8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855.scope. May 13 00:39:47.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.227000 audit: BPF prog-id=94 op=LOAD May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2460 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623234396665613039343430356631323761393230353135636638 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2460 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623234396665613039343430356631323761393230353135636638 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit: BPF prog-id=95 op=LOAD May 13 00:39:47.228000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024b20 items=0 ppid=2460 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623234396665613039343430356631323761393230353135636638 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit: BPF prog-id=96 op=LOAD May 13 00:39:47.228000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024b68 items=0 ppid=2460 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623234396665613039343430356631323761393230353135636638 May 13 00:39:47.228000 audit: BPF prog-id=96 op=UNLOAD May 13 00:39:47.228000 audit: BPF prog-id=95 op=UNLOAD May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.228000 audit: BPF prog-id=97 op=LOAD May 13 00:39:47.228000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024f78 items=0 ppid=2460 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623234396665613039343430356631323761393230353135636638 May 13 00:39:47.230116 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:47.255394 env[1206]: time="2025-05-13T00:39:47.255348805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-2qdgs,Uid:ec0eaed8-7365-4aec-98ce-507476f15d59,Namespace:default,Attempt:1,} returns sandbox id \"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855\"" May 13 00:39:47.257083 env[1206]: time="2025-05-13T00:39:47.257054804Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:39:47.420887 kubelet[1454]: E0513 00:39:47.420821 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:48.225721 systemd-networkd[1033]: cali84b836a445a: Gained IPv6LL May 13 00:39:48.421228 kubelet[1454]: E0513 00:39:48.421157 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:49.421934 kubelet[1454]: E0513 00:39:49.421861 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:49.686926 env[1206]: time="2025-05-13T00:39:49.686492061Z" level=info msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.757 [INFO][2518] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.757 [INFO][2518] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" iface="eth0" netns="/var/run/netns/cni-f5b15b19-d7c7-34c1-5d74-de2ae504aa72" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.758 [INFO][2518] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" iface="eth0" netns="/var/run/netns/cni-f5b15b19-d7c7-34c1-5d74-de2ae504aa72" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.758 [INFO][2518] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" iface="eth0" netns="/var/run/netns/cni-f5b15b19-d7c7-34c1-5d74-de2ae504aa72" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.758 [INFO][2518] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.758 [INFO][2518] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.784 [INFO][2526] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.784 [INFO][2526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.784 [INFO][2526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.796 [WARNING][2526] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.796 [INFO][2526] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.800 [INFO][2526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:49.803427 env[1206]: 2025-05-13 00:39:49.801 [INFO][2518] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:39:49.806627 systemd[1]: run-netns-cni\x2df5b15b19\x2dd7c7\x2d34c1\x2d5d74\x2dde2ae504aa72.mount: Deactivated successfully. May 13 00:39:49.808827 env[1206]: time="2025-05-13T00:39:49.806809870Z" level=info msg="TearDown network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" successfully" May 13 00:39:49.808827 env[1206]: time="2025-05-13T00:39:49.806868592Z" level=info msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" returns successfully" May 13 00:39:49.808827 env[1206]: time="2025-05-13T00:39:49.807700812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cjlrr,Uid:2f5de204-aa00-4a75-a752-0e7e97211ab2,Namespace:calico-system,Attempt:1,}" May 13 00:39:50.142140 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:39:50.142295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali652f099b00b: link becomes ready May 13 00:39:50.142585 systemd-networkd[1033]: cali652f099b00b: Link UP May 13 00:39:50.142870 systemd-networkd[1033]: cali652f099b00b: Gained carrier May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.045 [INFO][2535] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-csi--node--driver--cjlrr-eth0 csi-node-driver- calico-system 2f5de204-aa00-4a75-a752-0e7e97211ab2 1072 0 2025-05-13 00:39:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.28 csi-node-driver-cjlrr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali652f099b00b [] []}} ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.045 [INFO][2535] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.089 [INFO][2549] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" HandleID="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.099 [INFO][2549] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" HandleID="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dcfd0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.28", "pod":"csi-node-driver-cjlrr", "timestamp":"2025-05-13 00:39:50.089421965 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.100 [INFO][2549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.100 [INFO][2549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.100 [INFO][2549] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.102 [INFO][2549] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.107 [INFO][2549] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.112 [INFO][2549] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.115 [INFO][2549] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.118 [INFO][2549] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.118 [INFO][2549] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.120 [INFO][2549] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139 May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.125 [INFO][2549] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.131 [INFO][2549] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.194/26] block=192.168.75.192/26 handle="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.131 [INFO][2549] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.194/26] handle="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" host="10.0.0.28" May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.131 [INFO][2549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:50.154961 env[1206]: 2025-05-13 00:39:50.131 [INFO][2549] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.194/26] IPv6=[] ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" HandleID="k8s-pod-network.b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.133 [INFO][2535] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--cjlrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2f5de204-aa00-4a75-a752-0e7e97211ab2", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"csi-node-driver-cjlrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali652f099b00b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.133 [INFO][2535] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.194/32] ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.133 [INFO][2535] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali652f099b00b ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.141 [INFO][2535] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.141 [INFO][2535] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--cjlrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2f5de204-aa00-4a75-a752-0e7e97211ab2", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139", Pod:"csi-node-driver-cjlrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali652f099b00b", MAC:"d6:bb:d3:c2:87:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:50.155867 env[1206]: 2025-05-13 00:39:50.153 [INFO][2535] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139" Namespace="calico-system" Pod="csi-node-driver-cjlrr" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:39:50.173099 kernel: kauditd_printk_skb: 608 callbacks suppressed May 13 00:39:50.173254 kernel: audit: type=1325 audit(1747096790.166:648): table=filter:82 family=2 entries=38 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:50.173283 kernel: audit: type=1300 audit(1747096790.166:648): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffff7e41480 a2=0 a3=7ffff7e4146c items=0 ppid=2182 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.166000 audit[2571]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:50.166000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffff7e41480 a2=0 a3=7ffff7e4146c items=0 ppid=2182 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.173559 env[1206]: time="2025-05-13T00:39:50.171873729Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:50.173559 env[1206]: time="2025-05-13T00:39:50.171919216Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:50.173559 env[1206]: time="2025-05-13T00:39:50.171931248Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:50.173559 env[1206]: time="2025-05-13T00:39:50.172070425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139 pid=2578 runtime=io.containerd.runc.v2 May 13 00:39:50.183103 kernel: audit: type=1327 audit(1747096790.166:648): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:50.166000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:50.195977 systemd[1]: Started cri-containerd-b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139.scope. May 13 00:39:50.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.233328 kernel: audit: type=1400 audit(1747096790.217:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.237503 kernel: audit: type=1400 audit(1747096790.217:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.237606 kernel: audit: type=1400 audit(1747096790.217:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.240493 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:39:50.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.246367 kernel: audit: type=1400 audit(1747096790.217:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.246561 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 00:39:50.246591 kernel: audit: type=1400 audit(1747096790.217:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.225000 audit: BPF prog-id=98 op=LOAD May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.226000 audit: BPF prog-id=99 op=LOAD May 13 00:39:50.226000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283940 items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.232000 audit: BPF prog-id=100 op=LOAD May 13 00:39:50.232000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283988 items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.238000 audit: BPF prog-id=100 op=UNLOAD May 13 00:39:50.238000 audit: BPF prog-id=99 op=UNLOAD May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197c30 a2=78 a3=c000283d98 items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:50.238000 audit: BPF prog-id=101 op=LOAD May 13 00:39:50.238000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283d98 items=0 ppid=2578 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:50.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363738623566653562343937333936643430616461313365356232 May 13 00:39:50.252346 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:50.262527 env[1206]: time="2025-05-13T00:39:50.262458029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cjlrr,Uid:2f5de204-aa00-4a75-a752-0e7e97211ab2,Namespace:calico-system,Attempt:1,} returns sandbox id \"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139\"" May 13 00:39:50.424876 kubelet[1454]: E0513 00:39:50.422613 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:50.489338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2994083776.mount: Deactivated successfully. May 13 00:39:51.423090 kubelet[1454]: E0513 00:39:51.422970 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:51.425418 systemd-networkd[1033]: cali652f099b00b: Gained IPv6LL May 13 00:39:52.356614 env[1206]: time="2025-05-13T00:39:52.356538197Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.358571 env[1206]: time="2025-05-13T00:39:52.358525903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.360503 env[1206]: time="2025-05-13T00:39:52.360434780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.362826 env[1206]: time="2025-05-13T00:39:52.362760271Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:52.363816 env[1206]: time="2025-05-13T00:39:52.363769363Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:39:52.365172 env[1206]: time="2025-05-13T00:39:52.365139724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:39:52.366120 env[1206]: time="2025-05-13T00:39:52.366088492Z" level=info msg="CreateContainer within sandbox \"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 13 00:39:52.383149 env[1206]: time="2025-05-13T00:39:52.383091606Z" level=info msg="CreateContainer within sandbox \"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"10fbc2124cdb03be094bebd42f1b3e4c975f791d0079766e0ec3d2b31cdb71eb\"" May 13 00:39:52.383797 env[1206]: time="2025-05-13T00:39:52.383747415Z" level=info msg="StartContainer for \"10fbc2124cdb03be094bebd42f1b3e4c975f791d0079766e0ec3d2b31cdb71eb\"" May 13 00:39:52.399038 systemd[1]: Started cri-containerd-10fbc2124cdb03be094bebd42f1b3e4c975f791d0079766e0ec3d2b31cdb71eb.scope. May 13 00:39:52.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.413000 audit: BPF prog-id=102 op=LOAD May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2460 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:52.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666263323132346364623033626530393462656264343266316233 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2460 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:52.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666263323132346364623033626530393462656264343266316233 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit: BPF prog-id=103 op=LOAD May 13 00:39:52.414000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6bc0 items=0 ppid=2460 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:52.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666263323132346364623033626530393462656264343266316233 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit: BPF prog-id=104 op=LOAD May 13 00:39:52.414000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6c08 items=0 ppid=2460 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:52.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666263323132346364623033626530393462656264343266316233 May 13 00:39:52.414000 audit: BPF prog-id=104 op=UNLOAD May 13 00:39:52.414000 audit: BPF prog-id=103 op=UNLOAD May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:52.414000 audit: BPF prog-id=105 op=LOAD May 13 00:39:52.414000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7018 items=0 ppid=2460 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:52.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666263323132346364623033626530393462656264343266316233 May 13 00:39:52.423957 kubelet[1454]: E0513 00:39:52.423910 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:52.427984 env[1206]: time="2025-05-13T00:39:52.427913921Z" level=info msg="StartContainer for \"10fbc2124cdb03be094bebd42f1b3e4c975f791d0079766e0ec3d2b31cdb71eb\" returns successfully" May 13 00:39:52.766534 kubelet[1454]: I0513 00:39:52.766346 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-2qdgs" podStartSLOduration=12.658179721 podStartE2EDuration="17.766322826s" podCreationTimestamp="2025-05-13 00:39:35 +0000 UTC" firstStartedPulling="2025-05-13 00:39:47.256787601 +0000 UTC m=+29.175831930" lastFinishedPulling="2025-05-13 00:39:52.364930686 +0000 UTC m=+34.283975035" observedRunningTime="2025-05-13 00:39:52.765952141 +0000 UTC m=+34.684996480" watchObservedRunningTime="2025-05-13 00:39:52.766322826 +0000 UTC m=+34.685367165" May 13 00:39:53.425243 kubelet[1454]: E0513 00:39:53.424990 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:53.989685 env[1206]: time="2025-05-13T00:39:53.989420970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:53.998174 env[1206]: time="2025-05-13T00:39:53.997624826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.000516 env[1206]: time="2025-05-13T00:39:54.000429374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.004616 env[1206]: time="2025-05-13T00:39:54.004527078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:39:54.006014 env[1206]: time="2025-05-13T00:39:54.005783597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:54.010589 env[1206]: time="2025-05-13T00:39:54.010524734Z" level=info msg="CreateContainer within sandbox \"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:39:54.044483 env[1206]: time="2025-05-13T00:39:54.044383433Z" level=info msg="CreateContainer within sandbox \"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b65af70481e0616bef28ed37acc36ce7aaa8e9083b2971f2c6d241ae721d67e3\"" May 13 00:39:54.045637 env[1206]: time="2025-05-13T00:39:54.045563888Z" level=info msg="StartContainer for \"b65af70481e0616bef28ed37acc36ce7aaa8e9083b2971f2c6d241ae721d67e3\"" May 13 00:39:54.073903 systemd[1]: Started cri-containerd-b65af70481e0616bef28ed37acc36ce7aaa8e9083b2971f2c6d241ae721d67e3.scope. May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f233a0292f8 items=0 ppid=2578 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:54.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356166373034383165303631366265663238656433376163633336 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit: BPF prog-id=106 op=LOAD May 13 00:39:54.096000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024bb8 items=0 ppid=2578 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:54.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356166373034383165303631366265663238656433376163633336 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit: BPF prog-id=107 op=LOAD May 13 00:39:54.096000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024c08 items=0 ppid=2578 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:54.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356166373034383165303631366265663238656433376163633336 May 13 00:39:54.096000 audit: BPF prog-id=107 op=UNLOAD May 13 00:39:54.096000 audit: BPF prog-id=106 op=UNLOAD May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:54.096000 audit: BPF prog-id=108 op=LOAD May 13 00:39:54.096000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024c98 items=0 ppid=2578 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:54.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356166373034383165303631366265663238656433376163633336 May 13 00:39:54.116516 env[1206]: time="2025-05-13T00:39:54.116399347Z" level=info msg="StartContainer for \"b65af70481e0616bef28ed37acc36ce7aaa8e9083b2971f2c6d241ae721d67e3\" returns successfully" May 13 00:39:54.117936 env[1206]: time="2025-05-13T00:39:54.117827132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:39:54.425243 kubelet[1454]: E0513 00:39:54.425171 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:55.034989 systemd[1]: run-containerd-runc-k8s.io-b65af70481e0616bef28ed37acc36ce7aaa8e9083b2971f2c6d241ae721d67e3-runc.a4pFoU.mount: Deactivated successfully. May 13 00:39:55.425616 kubelet[1454]: E0513 00:39:55.425528 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:56.426163 kubelet[1454]: E0513 00:39:56.426094 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:56.799580 env[1206]: time="2025-05-13T00:39:56.799443781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.801817 env[1206]: time="2025-05-13T00:39:56.801754228Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.803500 env[1206]: time="2025-05-13T00:39:56.803454987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.805117 env[1206]: time="2025-05-13T00:39:56.805068350Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:56.805517 env[1206]: time="2025-05-13T00:39:56.805472548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:39:56.807633 env[1206]: time="2025-05-13T00:39:56.807594246Z" level=info msg="CreateContainer within sandbox \"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:39:56.823865 env[1206]: time="2025-05-13T00:39:56.823807599Z" level=info msg="CreateContainer within sandbox \"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"446db75a184e8b3ca2f44919c7b45666dd284179213222f63195bff0acacee03\"" May 13 00:39:56.824457 env[1206]: time="2025-05-13T00:39:56.824423729Z" level=info msg="StartContainer for \"446db75a184e8b3ca2f44919c7b45666dd284179213222f63195bff0acacee03\"" May 13 00:39:56.844508 systemd[1]: Started cri-containerd-446db75a184e8b3ca2f44919c7b45666dd284179213222f63195bff0acacee03.scope. May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.860012 kernel: kauditd_printk_skb: 163 callbacks suppressed May 13 00:39:56.860171 kernel: audit: type=1400 audit(1747096796.855:692): avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.860227 kernel: audit: type=1300 audit(1747096796.855:692): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fac36f312f8 items=0 ppid=2578 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.855000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fac36f312f8 items=0 ppid=2578 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366462373561313834653862336361326634343931396337623435 May 13 00:39:56.868852 kernel: audit: type=1327 audit(1747096796.855:692): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366462373561313834653862336361326634343931396337623435 May 13 00:39:56.868966 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.871933 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.881256 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.881424 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.884705 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.884817 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.891209 kernel: audit: type=1400 audit(1747096796.855:693): avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.891374 env[1206]: time="2025-05-13T00:39:56.888116019Z" level=info msg="StartContainer for \"446db75a184e8b3ca2f44919c7b45666dd284179213222f63195bff0acacee03\" returns successfully" May 13 00:39:56.855000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.855000 audit: BPF prog-id=109 op=LOAD May 13 00:39:56.855000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024a58 items=0 ppid=2578 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366462373561313834653862336361326634343931396337623435 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.859000 audit: BPF prog-id=110 op=LOAD May 13 00:39:56.859000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024aa8 items=0 ppid=2578 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366462373561313834653862336361326634343931396337623435 May 13 00:39:56.863000 audit: BPF prog-id=110 op=UNLOAD May 13 00:39:56.863000 audit: BPF prog-id=109 op=UNLOAD May 13 00:39:56.863000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:56.863000 audit: BPF prog-id=111 op=LOAD May 13 00:39:56.863000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024b38 items=0 ppid=2578 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366462373561313834653862336361326634343931396337623435 May 13 00:39:57.102239 update_engine[1196]: I0513 00:39:57.102170 1196 update_attempter.cc:509] Updating boot flags... May 13 00:39:57.426718 kubelet[1454]: E0513 00:39:57.426446 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:57.697088 kubelet[1454]: I0513 00:39:57.696870 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:39:57.697088 kubelet[1454]: I0513 00:39:57.696912 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:39:57.836712 kubelet[1454]: I0513 00:39:57.836611 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-cjlrr" podStartSLOduration=33.29431484 podStartE2EDuration="39.836591292s" podCreationTimestamp="2025-05-13 00:39:18 +0000 UTC" firstStartedPulling="2025-05-13 00:39:50.264003629 +0000 UTC m=+32.183047968" lastFinishedPulling="2025-05-13 00:39:56.806280081 +0000 UTC m=+38.725324420" observedRunningTime="2025-05-13 00:39:57.836285221 +0000 UTC m=+39.755329590" watchObservedRunningTime="2025-05-13 00:39:57.836591292 +0000 UTC m=+39.755635631" May 13 00:39:58.401253 kubelet[1454]: E0513 00:39:58.401162 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:58.427219 kubelet[1454]: E0513 00:39:58.427101 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:59.427532 kubelet[1454]: E0513 00:39:59.427426 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:39:59.436000 audit[2771]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.436000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffccc797a90 a2=0 a3=7ffccc797a7c items=0 ppid=1721 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.446000 audit[2771]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.446000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffccc797a90 a2=0 a3=0 items=0 ppid=1721 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.464000 audit[2773]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.464000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffeb511ba90 a2=0 a3=7ffeb511ba7c items=0 ppid=1721 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.474000 audit[2773]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.474000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeb511ba90 a2=0 a3=0 items=0 ppid=1721 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.501191 systemd[1]: Created slice kubepods-besteffort-pod93bb708b_d5a2_478e_9826_e5e92b5bdb4d.slice. May 13 00:39:59.611202 kubelet[1454]: I0513 00:39:59.611126 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/93bb708b-d5a2-478e-9826-e5e92b5bdb4d-data\") pod \"nfs-server-provisioner-0\" (UID: \"93bb708b-d5a2-478e-9826-e5e92b5bdb4d\") " pod="default/nfs-server-provisioner-0" May 13 00:39:59.611202 kubelet[1454]: I0513 00:39:59.611189 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xfqkf\" (UniqueName: \"kubernetes.io/projected/93bb708b-d5a2-478e-9826-e5e92b5bdb4d-kube-api-access-xfqkf\") pod \"nfs-server-provisioner-0\" (UID: \"93bb708b-d5a2-478e-9826-e5e92b5bdb4d\") " pod="default/nfs-server-provisioner-0" May 13 00:39:59.805685 env[1206]: time="2025-05-13T00:39:59.805610475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:93bb708b-d5a2-478e-9826-e5e92b5bdb4d,Namespace:default,Attempt:0,}" May 13 00:40:00.107379 systemd-networkd[1033]: cali60e51b789ff: Link UP May 13 00:40:00.110227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:40:00.110316 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 13 00:40:00.110515 systemd-networkd[1033]: cali60e51b789ff: Gained carrier May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.895 [INFO][2775] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 93bb708b-d5a2-478e-9826-e5e92b5bdb4d 1134 0 2025-05-13 00:39:59 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.28 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.895 [INFO][2775] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.940 [INFO][2791] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" HandleID="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.957 [INFO][2791] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" HandleID="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c2290), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-13 00:39:59.940984654 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.958 [INFO][2791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.958 [INFO][2791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.958 [INFO][2791] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' May 13 00:40:00.131802 env[1206]: 2025-05-13 00:39:59.964 [INFO][2791] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.056 [INFO][2791] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.067 [INFO][2791] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.071 [INFO][2791] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.075 [INFO][2791] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.075 [INFO][2791] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.080 [INFO][2791] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.091 [INFO][2791] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.099 [INFO][2791] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.195/26] block=192.168.75.192/26 handle="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.099 [INFO][2791] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.195/26] handle="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" host="10.0.0.28" May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.100 [INFO][2791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:00.131802 env[1206]: 2025-05-13 00:40:00.100 [INFO][2791] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.195/26] IPv6=[] ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" HandleID="k8s-pod-network.cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.134073 env[1206]: 2025-05-13 00:40:00.103 [INFO][2775] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"93bb708b-d5a2-478e-9826-e5e92b5bdb4d", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:00.134073 env[1206]: 2025-05-13 00:40:00.104 [INFO][2775] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.195/32] ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.134073 env[1206]: 2025-05-13 00:40:00.104 [INFO][2775] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.134073 env[1206]: 2025-05-13 00:40:00.110 [INFO][2775] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.134347 env[1206]: 2025-05-13 00:40:00.110 [INFO][2775] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"93bb708b-d5a2-478e-9826-e5e92b5bdb4d", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"96:4c:5a:47:76:5c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:00.134347 env[1206]: 2025-05-13 00:40:00.129 [INFO][2775] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" May 13 00:40:00.144000 audit[2813]: NETFILTER_CFG table=filter:87 family=2 entries=44 op=nft_register_chain pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:00.144000 audit[2813]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffeb67c9a30 a2=0 a3=7ffeb67c9a1c items=0 ppid=2182 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.144000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:00.156945 env[1206]: time="2025-05-13T00:40:00.156795981Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:00.156945 env[1206]: time="2025-05-13T00:40:00.156876304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:00.156945 env[1206]: time="2025-05-13T00:40:00.156893777Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:00.157532 env[1206]: time="2025-05-13T00:40:00.157468345Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd pid=2821 runtime=io.containerd.runc.v2 May 13 00:40:00.181074 systemd[1]: run-containerd-runc-k8s.io-cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd-runc.TeSArX.mount: Deactivated successfully. May 13 00:40:00.184723 systemd[1]: Started cri-containerd-cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd.scope. May 13 00:40:00.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.195000 audit: BPF prog-id=112 op=LOAD May 13 00:40:00.195000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.195000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2821 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366366534303131666163616231306632373265383934316635303263 May 13 00:40:00.195000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.195000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2821 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366366534303131666163616231306632373265383934316635303263 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit: BPF prog-id=113 op=LOAD May 13 00:40:00.196000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ec000 items=0 ppid=2821 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366366534303131666163616231306632373265383934316635303263 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit: BPF prog-id=114 op=LOAD May 13 00:40:00.196000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ec048 items=0 ppid=2821 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366366534303131666163616231306632373265383934316635303263 May 13 00:40:00.196000 audit: BPF prog-id=114 op=UNLOAD May 13 00:40:00.196000 audit: BPF prog-id=113 op=UNLOAD May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:00.196000 audit: BPF prog-id=115 op=LOAD May 13 00:40:00.196000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec458 items=0 ppid=2821 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366366534303131666163616231306632373265383934316635303263 May 13 00:40:00.198929 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:00.228500 env[1206]: time="2025-05-13T00:40:00.228428725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:93bb708b-d5a2-478e-9826-e5e92b5bdb4d,Namespace:default,Attempt:0,} returns sandbox id \"cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd\"" May 13 00:40:00.230303 env[1206]: time="2025-05-13T00:40:00.230256677Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 13 00:40:00.427796 kubelet[1454]: E0513 00:40:00.427570 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:01.428692 kubelet[1454]: E0513 00:40:01.428622 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:01.857317 systemd-networkd[1033]: cali60e51b789ff: Gained IPv6LL May 13 00:40:02.428874 kubelet[1454]: E0513 00:40:02.428803 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:02.856937 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1855015335.mount: Deactivated successfully. May 13 00:40:03.429969 kubelet[1454]: E0513 00:40:03.429897 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:04.431093 kubelet[1454]: E0513 00:40:04.431014 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:05.239023 env[1206]: time="2025-05-13T00:40:05.238934226Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:05.241524 env[1206]: time="2025-05-13T00:40:05.241467301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:05.243585 env[1206]: time="2025-05-13T00:40:05.243531800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:05.245565 env[1206]: time="2025-05-13T00:40:05.245513984Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:05.246206 env[1206]: time="2025-05-13T00:40:05.246168521Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 13 00:40:05.248889 env[1206]: time="2025-05-13T00:40:05.248846769Z" level=info msg="CreateContainer within sandbox \"cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 13 00:40:05.267611 env[1206]: time="2025-05-13T00:40:05.267554085Z" level=info msg="CreateContainer within sandbox \"cf6e4011facab10f272e8941f502ca8eb41cb87c0c24a433d67063fd91bcb8dd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"afe408975ee88b162ed466be692a3a99df4207d00e0d745afb37b9f4b1bd4748\"" May 13 00:40:05.268231 env[1206]: time="2025-05-13T00:40:05.268174887Z" level=info msg="StartContainer for \"afe408975ee88b162ed466be692a3a99df4207d00e0d745afb37b9f4b1bd4748\"" May 13 00:40:05.285917 systemd[1]: run-containerd-runc-k8s.io-afe408975ee88b162ed466be692a3a99df4207d00e0d745afb37b9f4b1bd4748-runc.6DMbbF.mount: Deactivated successfully. May 13 00:40:05.291673 systemd[1]: Started cri-containerd-afe408975ee88b162ed466be692a3a99df4207d00e0d745afb37b9f4b1bd4748.scope. May 13 00:40:05.305279 kernel: kauditd_printk_skb: 105 callbacks suppressed May 13 00:40:05.305452 kernel: audit: type=1400 audit(1747096805.302:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.312476 kernel: audit: type=1400 audit(1747096805.302:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.312650 kernel: audit: type=1400 audit(1747096805.303:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.319906 kernel: audit: type=1400 audit(1747096805.303:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.319986 kernel: audit: type=1400 audit(1747096805.303:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.323596 kernel: audit: type=1400 audit(1747096805.303:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.327227 kernel: audit: type=1400 audit(1747096805.303:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.330885 kernel: audit: type=1400 audit(1747096805.303:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.334548 kernel: audit: type=1400 audit(1747096805.303:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.338275 kernel: audit: type=1400 audit(1747096805.307:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit: BPF prog-id=116 op=LOAD May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2821 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653430383937356565383862313632656434363662653639326133 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2821 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653430383937356565383862313632656434363662653639326133 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.307000 audit: BPF prog-id=117 op=LOAD May 13 00:40:05.307000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018b6f0 items=0 ppid=2821 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653430383937356565383862313632656434363662653639326133 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.315000 audit: BPF prog-id=118 op=LOAD May 13 00:40:05.315000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018b738 items=0 ppid=2821 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653430383937356565383862313632656434363662653639326133 May 13 00:40:05.318000 audit: BPF prog-id=118 op=UNLOAD May 13 00:40:05.318000 audit: BPF prog-id=117 op=UNLOAD May 13 00:40:05.318000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { perfmon } for pid=2869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit[2869]: AVC avc: denied { bpf } for pid=2869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:05.318000 audit: BPF prog-id=119 op=LOAD May 13 00:40:05.318000 audit[2869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00018bb48 items=0 ppid=2821 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653430383937356565383862313632656434363662653639326133 May 13 00:40:05.355030 env[1206]: time="2025-05-13T00:40:05.354946798Z" level=info msg="StartContainer for \"afe408975ee88b162ed466be692a3a99df4207d00e0d745afb37b9f4b1bd4748\" returns successfully" May 13 00:40:05.397000 audit[2898]: AVC avc: denied { search } for pid=2898 comm="rpcbind" name="crypto" dev="proc" ino=21314 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:40:05.397000 audit[2898]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1ef4d810c0 a2=0 a3=0 items=0 ppid=2878 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 key=(null) May 13 00:40:05.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 13 00:40:05.429000 audit[2903]: AVC avc: denied { search } for pid=2903 comm="dbus-daemon" name="crypto" dev="proc" ino=21314 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:40:05.429000 audit[2903]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fde17a820c0 a2=0 a3=0 items=0 ppid=2878 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 key=(null) May 13 00:40:05.429000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:40:05.431617 kubelet[1454]: E0513 00:40:05.431557 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:05.432000 audit[2904]: AVC avc: denied { watch } for pid=2904 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c608,c703 tclass=dir permissive=0 May 13 00:40:05.432000 audit[2904]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55845b8fcbf0 a2=2c8 a3=7ffd59cd624c items=0 ppid=2878 pid=2904 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 key=(null) May 13 00:40:05.432000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:40:05.435000 audit[2905]: AVC avc: denied { read } for pid=2905 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 13 00:40:05.435000 audit[2905]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff0d75e1320 a1=80000 a2=d a3=7fffa090ace0 items=0 ppid=2878 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 key=(null) May 13 00:40:05.435000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:40:05.436000 audit[2905]: AVC avc: denied { search } for pid=2905 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21314 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:40:05.436000 audit[2905]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff0d6b350c0 a2=0 a3=0 items=0 ppid=2878 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c703 key=(null) May 13 00:40:05.436000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:40:05.815798 kubelet[1454]: I0513 00:40:05.815720 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.79819001 podStartE2EDuration="6.815701669s" podCreationTimestamp="2025-05-13 00:39:59 +0000 UTC" firstStartedPulling="2025-05-13 00:40:00.229822093 +0000 UTC m=+42.148866432" lastFinishedPulling="2025-05-13 00:40:05.247333752 +0000 UTC m=+47.166378091" observedRunningTime="2025-05-13 00:40:05.815435837 +0000 UTC m=+47.734480176" watchObservedRunningTime="2025-05-13 00:40:05.815701669 +0000 UTC m=+47.734746008" May 13 00:40:05.826000 audit[2923]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:05.826000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc1a477930 a2=0 a3=7ffc1a47791c items=0 ppid=1721 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:05.836000 audit[2923]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:05.836000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc1a477930 a2=0 a3=7ffc1a47791c items=0 ppid=1721 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:06.432639 kubelet[1454]: E0513 00:40:06.432562 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:07.399694 kubelet[1454]: E0513 00:40:07.399657 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:07.433191 kubelet[1454]: E0513 00:40:07.433149 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:08.433586 kubelet[1454]: E0513 00:40:08.433538 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:09.434732 kubelet[1454]: E0513 00:40:09.434666 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:10.435423 kubelet[1454]: E0513 00:40:10.435326 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:11.435925 kubelet[1454]: E0513 00:40:11.435867 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:12.436862 kubelet[1454]: E0513 00:40:12.436801 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:13.437176 kubelet[1454]: E0513 00:40:13.437131 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:14.437696 kubelet[1454]: E0513 00:40:14.437639 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:15.262001 systemd[1]: Created slice kubepods-besteffort-podc167fd19_89a1_4241_96d8_0812052bcef2.slice. May 13 00:40:15.309807 kubelet[1454]: I0513 00:40:15.309752 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f6d063ed-64de-4714-a80c-7132bf9863c2\" (UniqueName: \"kubernetes.io/nfs/c167fd19-89a1-4241-96d8-0812052bcef2-pvc-f6d063ed-64de-4714-a80c-7132bf9863c2\") pod \"test-pod-1\" (UID: \"c167fd19-89a1-4241-96d8-0812052bcef2\") " pod="default/test-pod-1" May 13 00:40:15.309807 kubelet[1454]: I0513 00:40:15.309799 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wggbh\" (UniqueName: \"kubernetes.io/projected/c167fd19-89a1-4241-96d8-0812052bcef2-kube-api-access-wggbh\") pod \"test-pod-1\" (UID: \"c167fd19-89a1-4241-96d8-0812052bcef2\") " pod="default/test-pod-1" May 13 00:40:15.422074 kernel: Failed to create system directory netfs May 13 00:40:15.422180 kernel: kauditd_printk_skb: 68 callbacks suppressed May 13 00:40:15.422212 kernel: audit: type=1400 audit(1747096815.418:746): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.422245 kernel: Failed to create system directory netfs May 13 00:40:15.418000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.422411 kernel: audit: type=1400 audit(1747096815.418:746): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.418000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.427064 kernel: Failed to create system directory netfs May 13 00:40:15.427306 kernel: audit: type=1400 audit(1747096815.418:746): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.418000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.418000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.436058 kernel: Failed to create system directory netfs May 13 00:40:15.436097 kernel: audit: type=1400 audit(1747096815.418:746): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.438317 kubelet[1454]: E0513 00:40:15.438282 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:15.418000 audit[2954]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8322a15e0 a1=153bc a2=55a814cd92b0 a3=5 items=0 ppid=70 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.418000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:40:15.446954 kernel: audit: type=1300 audit(1747096815.418:746): arch=c000003e syscall=175 success=yes exit=0 a0=55a8322a15e0 a1=153bc a2=55a814cd92b0 a3=5 items=0 ppid=70 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.447014 kernel: audit: type=1327 audit(1747096815.418:746): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.451818 kernel: Failed to create system directory fscache May 13 00:40:15.451888 kernel: audit: type=1400 audit(1747096815.444:747): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.451910 kernel: Failed to create system directory fscache May 13 00:40:15.451930 kernel: audit: type=1400 audit(1747096815.444:747): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.460533 kernel: Failed to create system directory fscache May 13 00:40:15.460579 kernel: audit: type=1400 audit(1747096815.444:747): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.460604 kernel: Failed to create system directory fscache May 13 00:40:15.460626 kernel: audit: type=1400 audit(1747096815.444:747): avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.461330 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.466464 kernel: Failed to create system directory fscache May 13 00:40:15.466504 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.468093 kernel: Failed to create system directory fscache May 13 00:40:15.468123 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.469655 kernel: Failed to create system directory fscache May 13 00:40:15.469688 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.471149 kernel: Failed to create system directory fscache May 13 00:40:15.471194 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.444000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.472631 kernel: Failed to create system directory fscache May 13 00:40:15.444000 audit[2954]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8324b69c0 a1=4c0fc a2=55a814cd92b0 a3=5 items=0 ppid=70 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.444000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:40:15.475097 kernel: FS-Cache: Loaded May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.505754 kernel: Failed to create system directory sunrpc May 13 00:40:15.505863 kernel: Failed to create system directory sunrpc May 13 00:40:15.505881 kernel: Failed to create system directory sunrpc May 13 00:40:15.505898 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.507206 kernel: Failed to create system directory sunrpc May 13 00:40:15.507246 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.508665 kernel: Failed to create system directory sunrpc May 13 00:40:15.508700 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.547835 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.549067 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.550742 kernel: Failed to create system directory sunrpc May 13 00:40:15.550789 kernel: Failed to create system directory sunrpc May 13 00:40:15.550812 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.551475 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.552188 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.553635 kernel: Failed to create system directory sunrpc May 13 00:40:15.553665 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.555080 kernel: Failed to create system directory sunrpc May 13 00:40:15.555107 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.556554 kernel: Failed to create system directory sunrpc May 13 00:40:15.556596 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.558730 kernel: Failed to create system directory sunrpc May 13 00:40:15.558761 kernel: Failed to create system directory sunrpc May 13 00:40:15.558797 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.560176 kernel: Failed to create system directory sunrpc May 13 00:40:15.560207 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.561742 kernel: Failed to create system directory sunrpc May 13 00:40:15.561788 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.562516 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.564687 kernel: Failed to create system directory sunrpc May 13 00:40:15.564742 kernel: Failed to create system directory sunrpc May 13 00:40:15.564768 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.565410 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.566144 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.567598 kernel: Failed to create system directory sunrpc May 13 00:40:15.567638 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.568317 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.569776 kernel: Failed to create system directory sunrpc May 13 00:40:15.569821 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.570508 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.572886 kernel: Failed to create system directory sunrpc May 13 00:40:15.572924 kernel: Failed to create system directory sunrpc May 13 00:40:15.572952 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.573759 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.574498 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.575224 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.576689 kernel: Failed to create system directory sunrpc May 13 00:40:15.576729 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.577414 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.578140 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.579616 kernel: Failed to create system directory sunrpc May 13 00:40:15.579667 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.580348 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.581112 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.582614 kernel: Failed to create system directory sunrpc May 13 00:40:15.582676 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.583376 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.584119 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.585603 kernel: Failed to create system directory sunrpc May 13 00:40:15.585652 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.586330 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.587757 kernel: Failed to create system directory sunrpc May 13 00:40:15.587792 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.589210 kernel: Failed to create system directory sunrpc May 13 00:40:15.589263 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.590655 kernel: Failed to create system directory sunrpc May 13 00:40:15.590679 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.592121 kernel: Failed to create system directory sunrpc May 13 00:40:15.592161 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.593569 kernel: Failed to create system directory sunrpc May 13 00:40:15.593611 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.595734 kernel: Failed to create system directory sunrpc May 13 00:40:15.595775 kernel: Failed to create system directory sunrpc May 13 00:40:15.595798 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.596500 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.597224 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.598669 kernel: Failed to create system directory sunrpc May 13 00:40:15.598704 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.599393 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.601564 kernel: Failed to create system directory sunrpc May 13 00:40:15.601606 kernel: Failed to create system directory sunrpc May 13 00:40:15.601632 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.603729 kernel: Failed to create system directory sunrpc May 13 00:40:15.603758 kernel: Failed to create system directory sunrpc May 13 00:40:15.603788 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.605184 kernel: Failed to create system directory sunrpc May 13 00:40:15.605214 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.606629 kernel: Failed to create system directory sunrpc May 13 00:40:15.606658 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.608072 kernel: Failed to create system directory sunrpc May 13 00:40:15.608110 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.609512 kernel: Failed to create system directory sunrpc May 13 00:40:15.609542 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.610244 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.611716 kernel: Failed to create system directory sunrpc May 13 00:40:15.611763 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.613175 kernel: Failed to create system directory sunrpc May 13 00:40:15.613203 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.614619 kernel: Failed to create system directory sunrpc May 13 00:40:15.614648 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.616064 kernel: Failed to create system directory sunrpc May 13 00:40:15.616094 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.617505 kernel: Failed to create system directory sunrpc May 13 00:40:15.617543 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.619666 kernel: Failed to create system directory sunrpc May 13 00:40:15.619704 kernel: Failed to create system directory sunrpc May 13 00:40:15.619730 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.621126 kernel: Failed to create system directory sunrpc May 13 00:40:15.621157 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.622576 kernel: Failed to create system directory sunrpc May 13 00:40:15.622607 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.624742 kernel: Failed to create system directory sunrpc May 13 00:40:15.624777 kernel: Failed to create system directory sunrpc May 13 00:40:15.624799 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.626255 kernel: Failed to create system directory sunrpc May 13 00:40:15.626291 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.627774 kernel: Failed to create system directory sunrpc May 13 00:40:15.627804 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.629340 kernel: Failed to create system directory sunrpc May 13 00:40:15.629383 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.631732 kernel: Failed to create system directory sunrpc May 13 00:40:15.631779 kernel: Failed to create system directory sunrpc May 13 00:40:15.631813 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.633342 kernel: Failed to create system directory sunrpc May 13 00:40:15.633373 kernel: Failed to create system directory sunrpc May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.493000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.635071 kernel: Failed to create system directory sunrpc May 13 00:40:15.644536 kernel: RPC: Registered named UNIX socket transport module. May 13 00:40:15.644599 kernel: RPC: Registered udp transport module. May 13 00:40:15.644623 kernel: RPC: Registered tcp transport module. May 13 00:40:15.645261 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 13 00:40:15.493000 audit[2954]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a832502ad0 a1=1a814c a2=55a814cd92b0 a3=5 items=6 ppid=70 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.493000 audit: CWD cwd="/" May 13 00:40:15.493000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PATH item=1 name=(null) inode=22244 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PATH item=2 name=(null) inode=22244 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PATH item=3 name=(null) inode=22245 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PATH item=4 name=(null) inode=22244 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PATH item=5 name=(null) inode=22246 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:15.493000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.680631 kernel: Failed to create system directory nfs May 13 00:40:15.680675 kernel: Failed to create system directory nfs May 13 00:40:15.680694 kernel: Failed to create system directory nfs May 13 00:40:15.680712 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.682684 kernel: Failed to create system directory nfs May 13 00:40:15.682718 kernel: Failed to create system directory nfs May 13 00:40:15.682738 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.684059 kernel: Failed to create system directory nfs May 13 00:40:15.684093 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.685473 kernel: Failed to create system directory nfs May 13 00:40:15.685568 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.686164 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.687545 kernel: Failed to create system directory nfs May 13 00:40:15.687565 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.689632 kernel: Failed to create system directory nfs May 13 00:40:15.689661 kernel: Failed to create system directory nfs May 13 00:40:15.689674 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.691069 kernel: Failed to create system directory nfs May 13 00:40:15.691101 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.692450 kernel: Failed to create system directory nfs May 13 00:40:15.692473 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.693148 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.694517 kernel: Failed to create system directory nfs May 13 00:40:15.694543 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.696578 kernel: Failed to create system directory nfs May 13 00:40:15.696606 kernel: Failed to create system directory nfs May 13 00:40:15.696621 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.697274 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.698635 kernel: Failed to create system directory nfs May 13 00:40:15.698655 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.700713 kernel: Failed to create system directory nfs May 13 00:40:15.700737 kernel: Failed to create system directory nfs May 13 00:40:15.700753 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.702159 kernel: Failed to create system directory nfs May 13 00:40:15.702199 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.703568 kernel: Failed to create system directory nfs May 13 00:40:15.703594 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.705720 kernel: Failed to create system directory nfs May 13 00:40:15.705750 kernel: Failed to create system directory nfs May 13 00:40:15.705771 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.707174 kernel: Failed to create system directory nfs May 13 00:40:15.707210 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.709541 kernel: Failed to create system directory nfs May 13 00:40:15.709573 kernel: Failed to create system directory nfs May 13 00:40:15.709589 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.711609 kernel: Failed to create system directory nfs May 13 00:40:15.711663 kernel: Failed to create system directory nfs May 13 00:40:15.711688 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.712314 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.713680 kernel: Failed to create system directory nfs May 13 00:40:15.713703 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.715073 kernel: Failed to create system directory nfs May 13 00:40:15.715096 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.716449 kernel: Failed to create system directory nfs May 13 00:40:15.716471 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.718514 kernel: Failed to create system directory nfs May 13 00:40:15.718536 kernel: Failed to create system directory nfs May 13 00:40:15.718555 kernel: Failed to create system directory nfs May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.671000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.720589 kernel: Failed to create system directory nfs May 13 00:40:15.720612 kernel: Failed to create system directory nfs May 13 00:40:15.741069 kernel: FS-Cache: Netfs 'nfs' registered for caching May 13 00:40:15.671000 audit[2954]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a832723a10 a1=16eae4 a2=55a814cd92b0 a3=5 items=0 ppid=70 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.671000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.777561 kernel: Failed to create system directory nfs4 May 13 00:40:15.777654 kernel: Failed to create system directory nfs4 May 13 00:40:15.777669 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.778280 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.779703 kernel: Failed to create system directory nfs4 May 13 00:40:15.779724 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.781158 kernel: Failed to create system directory nfs4 May 13 00:40:15.781215 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.782588 kernel: Failed to create system directory nfs4 May 13 00:40:15.782607 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.784124 kernel: Failed to create system directory nfs4 May 13 00:40:15.784168 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.785589 kernel: Failed to create system directory nfs4 May 13 00:40:15.785613 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.787068 kernel: Failed to create system directory nfs4 May 13 00:40:15.787121 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.788528 kernel: Failed to create system directory nfs4 May 13 00:40:15.788557 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.790772 kernel: Failed to create system directory nfs4 May 13 00:40:15.790801 kernel: Failed to create system directory nfs4 May 13 00:40:15.790815 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.792205 kernel: Failed to create system directory nfs4 May 13 00:40:15.792242 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.793688 kernel: Failed to create system directory nfs4 May 13 00:40:15.793706 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.795152 kernel: Failed to create system directory nfs4 May 13 00:40:15.795170 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.796579 kernel: Failed to create system directory nfs4 May 13 00:40:15.796599 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.798145 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.799341 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.800557 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.803636 kernel: Failed to create system directory nfs4 May 13 00:40:15.803682 kernel: Failed to create system directory nfs4 May 13 00:40:15.803805 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.805528 kernel: Failed to create system directory nfs4 May 13 00:40:15.805566 kernel: Failed to create system directory nfs4 May 13 00:40:15.807772 kernel: Failed to create system directory nfs4 May 13 00:40:15.807810 kernel: Failed to create system directory nfs4 May 13 00:40:15.807829 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.809285 kernel: Failed to create system directory nfs4 May 13 00:40:15.809314 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.810770 kernel: Failed to create system directory nfs4 May 13 00:40:15.810809 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.812272 kernel: Failed to create system directory nfs4 May 13 00:40:15.812311 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.813811 kernel: Failed to create system directory nfs4 May 13 00:40:15.813851 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.815368 kernel: Failed to create system directory nfs4 May 13 00:40:15.815402 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.817611 kernel: Failed to create system directory nfs4 May 13 00:40:15.817641 kernel: Failed to create system directory nfs4 May 13 00:40:15.817661 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.819121 kernel: Failed to create system directory nfs4 May 13 00:40:15.819157 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.820631 kernel: Failed to create system directory nfs4 May 13 00:40:15.820664 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.822127 kernel: Failed to create system directory nfs4 May 13 00:40:15.822159 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.823623 kernel: Failed to create system directory nfs4 May 13 00:40:15.823662 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.825093 kernel: Failed to create system directory nfs4 May 13 00:40:15.825122 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.826553 kernel: Failed to create system directory nfs4 May 13 00:40:15.826578 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.828089 kernel: Failed to create system directory nfs4 May 13 00:40:15.828125 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.829648 kernel: Failed to create system directory nfs4 May 13 00:40:15.829685 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.831080 kernel: Failed to create system directory nfs4 May 13 00:40:15.831158 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.832522 kernel: Failed to create system directory nfs4 May 13 00:40:15.832556 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.834627 kernel: Failed to create system directory nfs4 May 13 00:40:15.834654 kernel: Failed to create system directory nfs4 May 13 00:40:15.834672 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.836063 kernel: Failed to create system directory nfs4 May 13 00:40:15.836100 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.837488 kernel: Failed to create system directory nfs4 May 13 00:40:15.837517 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.839660 kernel: Failed to create system directory nfs4 May 13 00:40:15.839688 kernel: Failed to create system directory nfs4 May 13 00:40:15.839717 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.841128 kernel: Failed to create system directory nfs4 May 13 00:40:15.841168 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.842595 kernel: Failed to create system directory nfs4 May 13 00:40:15.842637 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.844718 kernel: Failed to create system directory nfs4 May 13 00:40:15.844751 kernel: Failed to create system directory nfs4 May 13 00:40:15.844786 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.846167 kernel: Failed to create system directory nfs4 May 13 00:40:15.846194 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.847637 kernel: Failed to create system directory nfs4 May 13 00:40:15.847666 kernel: Failed to create system directory nfs4 May 13 00:40:15.765000 audit[2960]: AVC avc: denied { confidentiality } for pid=2960 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.983404 kernel: NFS: Registering the id_resolver key type May 13 00:40:15.983526 kernel: Key type id_resolver registered May 13 00:40:15.983542 kernel: Key type id_legacy registered May 13 00:40:15.765000 audit[2960]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f17b6cff010 a1=209404 a2=559bd95ae2b0 a3=5 items=0 ppid=70 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.765000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.995681 kernel: Failed to create system directory rpcgss May 13 00:40:15.995731 kernel: Failed to create system directory rpcgss May 13 00:40:15.995752 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.997142 kernel: Failed to create system directory rpcgss May 13 00:40:15.997169 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.998593 kernel: Failed to create system directory rpcgss May 13 00:40:15.998622 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.000067 kernel: Failed to create system directory rpcgss May 13 00:40:16.000092 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.001505 kernel: Failed to create system directory rpcgss May 13 00:40:16.001541 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.002245 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.003677 kernel: Failed to create system directory rpcgss May 13 00:40:16.003702 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.005142 kernel: Failed to create system directory rpcgss May 13 00:40:16.005207 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.006647 kernel: Failed to create system directory rpcgss May 13 00:40:16.006673 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.008116 kernel: Failed to create system directory rpcgss May 13 00:40:16.008147 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.009572 kernel: Failed to create system directory rpcgss May 13 00:40:16.009606 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.011759 kernel: Failed to create system directory rpcgss May 13 00:40:16.011782 kernel: Failed to create system directory rpcgss May 13 00:40:16.011801 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:15.992000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:16.013244 kernel: Failed to create system directory rpcgss May 13 00:40:15.992000 audit[2961]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5dfe611010 a1=70b64 a2=560407a8b2b0 a3=5 items=0 ppid=70 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 13 00:40:16.026169 nfsidmap[2970]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:40:16.028847 nfsidmap[2973]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:40:16.039000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit[1274]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b1a0ed440 a2=10 a3=695a0afb01fa6275 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.039000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:40:16.039000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit[1274]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b1a0ed440 a2=10 a3=695a0afb01fa6275 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.039000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:40:16.039000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:40:16.039000 audit[1274]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b1a0ed440 a2=10 a3=695a0afb01fa6275 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.039000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:40:16.165060 env[1206]: time="2025-05-13T00:40:16.164968408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c167fd19-89a1-4241-96d8-0812052bcef2,Namespace:default,Attempt:0,}" May 13 00:40:16.267430 systemd-networkd[1033]: cali5ec59c6bf6e: Link UP May 13 00:40:16.270901 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:40:16.270942 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 13 00:40:16.271354 systemd-networkd[1033]: cali5ec59c6bf6e: Gained carrier May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.211 [INFO][2977] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-test--pod--1-eth0 default c167fd19-89a1-4241-96d8-0812052bcef2 1204 0 2025-05-13 00:39:59 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.28 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.211 [INFO][2977] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.236 [INFO][2991] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" HandleID="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Workload="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.243 [INFO][2991] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" HandleID="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Workload="10.0.0.28-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f4c70), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"test-pod-1", "timestamp":"2025-05-13 00:40:16.23656765 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.243 [INFO][2991] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.243 [INFO][2991] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.243 [INFO][2991] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.245 [INFO][2991] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.248 [INFO][2991] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.251 [INFO][2991] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.253 [INFO][2991] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.255 [INFO][2991] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.255 [INFO][2991] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.256 [INFO][2991] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848 May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.259 [INFO][2991] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.264 [INFO][2991] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.196/26] block=192.168.75.192/26 handle="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.264 [INFO][2991] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.196/26] handle="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" host="10.0.0.28" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.264 [INFO][2991] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.264 [INFO][2991] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.196/26] IPv6=[] ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" HandleID="k8s-pod-network.5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Workload="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.278346 env[1206]: 2025-05-13 00:40:16.265 [INFO][2977] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c167fd19-89a1-4241-96d8-0812052bcef2", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:16.279109 env[1206]: 2025-05-13 00:40:16.265 [INFO][2977] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.196/32] ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.279109 env[1206]: 2025-05-13 00:40:16.265 [INFO][2977] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.279109 env[1206]: 2025-05-13 00:40:16.271 [INFO][2977] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.279109 env[1206]: 2025-05-13 00:40:16.271 [INFO][2977] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c167fd19-89a1-4241-96d8-0812052bcef2", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0e:fe:44:29:eb:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:16.279109 env[1206]: 2025-05-13 00:40:16.277 [INFO][2977] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" May 13 00:40:16.288000 audit[3015]: NETFILTER_CFG table=filter:90 family=2 entries=34 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:16.288000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7fff9527ab30 a2=0 a3=7fff9527ab1c items=0 ppid=2182 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:16.290303 env[1206]: time="2025-05-13T00:40:16.290227804Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:16.290303 env[1206]: time="2025-05-13T00:40:16.290278911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:16.290303 env[1206]: time="2025-05-13T00:40:16.290289822Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:16.290555 env[1206]: time="2025-05-13T00:40:16.290497660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848 pid=3020 runtime=io.containerd.runc.v2 May 13 00:40:16.301394 systemd[1]: Started cri-containerd-5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848.scope. May 13 00:40:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.311000 audit: BPF prog-id=120 op=LOAD May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383762346163333833613566373363386437336464323566356639 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383762346163333833613566373363386437336464323566356639 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit: BPF prog-id=121 op=LOAD May 13 00:40:16.312000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002edd90 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383762346163333833613566373363386437336464323566356639 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit: BPF prog-id=122 op=LOAD May 13 00:40:16.312000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0002eddd8 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383762346163333833613566373363386437336464323566356639 May 13 00:40:16.312000 audit: BPF prog-id=122 op=UNLOAD May 13 00:40:16.312000 audit: BPF prog-id=121 op=UNLOAD May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.312000 audit: BPF prog-id=123 op=LOAD May 13 00:40:16.312000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003661e8 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383762346163333833613566373363386437336464323566356639 May 13 00:40:16.313394 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:40:16.333990 env[1206]: time="2025-05-13T00:40:16.333947035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c167fd19-89a1-4241-96d8-0812052bcef2,Namespace:default,Attempt:0,} returns sandbox id \"5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848\"" May 13 00:40:16.335483 env[1206]: time="2025-05-13T00:40:16.335436204Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:40:16.438964 kubelet[1454]: E0513 00:40:16.438833 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:16.769720 env[1206]: time="2025-05-13T00:40:16.769613204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:16.771513 env[1206]: time="2025-05-13T00:40:16.771476249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:16.773192 env[1206]: time="2025-05-13T00:40:16.773163999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:16.774753 env[1206]: time="2025-05-13T00:40:16.774719696Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:16.775284 env[1206]: time="2025-05-13T00:40:16.775257455Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:40:16.777258 env[1206]: time="2025-05-13T00:40:16.777218347Z" level=info msg="CreateContainer within sandbox \"5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 13 00:40:16.792213 env[1206]: time="2025-05-13T00:40:16.792175399Z" level=info msg="CreateContainer within sandbox \"5787b4ac383a5f73c8d73dd25f5f953eb745feb121d482f05ce4a1dbbe077848\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"65a11a5d6da9905d989584de6082dcebdbb7735699dd7f8c93d68a3953b1cce1\"" May 13 00:40:16.792572 env[1206]: time="2025-05-13T00:40:16.792550267Z" level=info msg="StartContainer for \"65a11a5d6da9905d989584de6082dcebdbb7735699dd7f8c93d68a3953b1cce1\"" May 13 00:40:16.808167 systemd[1]: Started cri-containerd-65a11a5d6da9905d989584de6082dcebdbb7735699dd7f8c93d68a3953b1cce1.scope. May 13 00:40:16.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit: BPF prog-id=124 op=LOAD May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3020 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613131613564366461393930356439383935383464653630383264 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3020 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613131613564366461393930356439383935383464653630383264 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit: BPF prog-id=125 op=LOAD May 13 00:40:16.817000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dcc00 items=0 ppid=3020 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613131613564366461393930356439383935383464653630383264 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.817000 audit: BPF prog-id=126 op=LOAD May 13 00:40:16.817000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dcc48 items=0 ppid=3020 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613131613564366461393930356439383935383464653630383264 May 13 00:40:16.817000 audit: BPF prog-id=126 op=UNLOAD May 13 00:40:16.817000 audit: BPF prog-id=125 op=UNLOAD May 13 00:40:16.818000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:16.818000 audit: BPF prog-id=127 op=LOAD May 13 00:40:16.818000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001dd058 items=0 ppid=3020 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613131613564366461393930356439383935383464653630383264 May 13 00:40:16.832316 env[1206]: time="2025-05-13T00:40:16.832274352Z" level=info msg="StartContainer for \"65a11a5d6da9905d989584de6082dcebdbb7735699dd7f8c93d68a3953b1cce1\" returns successfully" May 13 00:40:17.114000 audit[3109]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:17.114000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffba11a140 a2=0 a3=7fffba11a12c items=0 ppid=1721 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:17.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:17.122000 audit[3109]: NETFILTER_CFG table=nat:92 family=2 entries=58 op=nft_register_chain pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:17.122000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffba11a140 a2=0 a3=7fffba11a12c items=0 ppid=1721 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:17.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:17.422141 systemd[1]: run-containerd-runc-k8s.io-65a11a5d6da9905d989584de6082dcebdbb7735699dd7f8c93d68a3953b1cce1-runc.ELU2fL.mount: Deactivated successfully. May 13 00:40:17.439938 kubelet[1454]: E0513 00:40:17.439871 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:17.601225 systemd-networkd[1033]: cali5ec59c6bf6e: Gained IPv6LL May 13 00:40:17.844120 kubelet[1454]: I0513 00:40:17.844074 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.40306285 podStartE2EDuration="18.844056805s" podCreationTimestamp="2025-05-13 00:39:59 +0000 UTC" firstStartedPulling="2025-05-13 00:40:16.33517809 +0000 UTC m=+58.254222419" lastFinishedPulling="2025-05-13 00:40:16.776172045 +0000 UTC m=+58.695216374" observedRunningTime="2025-05-13 00:40:17.844032839 +0000 UTC m=+59.763077178" watchObservedRunningTime="2025-05-13 00:40:17.844056805 +0000 UTC m=+59.763101144" May 13 00:40:18.401185 kubelet[1454]: E0513 00:40:18.401127 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:18.434193 env[1206]: time="2025-05-13T00:40:18.434154312Z" level=info msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" May 13 00:40:18.440406 kubelet[1454]: E0513 00:40:18.440375 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.462 [WARNING][3125] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ec0eaed8-7365-4aec-98ce-507476f15d59", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855", Pod:"nginx-deployment-8587fbcb89-2qdgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali84b836a445a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.462 [INFO][3125] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.462 [INFO][3125] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" iface="eth0" netns="" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.462 [INFO][3125] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.462 [INFO][3125] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.481 [INFO][3133] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.481 [INFO][3133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.481 [INFO][3133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.487 [WARNING][3133] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.487 [INFO][3133] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.488 [INFO][3133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:18.490096 env[1206]: 2025-05-13 00:40:18.489 [INFO][3125] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.490712 env[1206]: time="2025-05-13T00:40:18.490123019Z" level=info msg="TearDown network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" successfully" May 13 00:40:18.490712 env[1206]: time="2025-05-13T00:40:18.490160271Z" level=info msg="StopPodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" returns successfully" May 13 00:40:18.490781 env[1206]: time="2025-05-13T00:40:18.490738847Z" level=info msg="RemovePodSandbox for \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" May 13 00:40:18.490813 env[1206]: time="2025-05-13T00:40:18.490768002Z" level=info msg="Forcibly stopping sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\"" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.518 [WARNING][3156] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ec0eaed8-7365-4aec-98ce-507476f15d59", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"8ab249fea094405f127a920515cf89f94b7100bb6f09b6f447af09bcfab82855", Pod:"nginx-deployment-8587fbcb89-2qdgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali84b836a445a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.518 [INFO][3156] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.518 [INFO][3156] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" iface="eth0" netns="" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.518 [INFO][3156] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.518 [INFO][3156] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.538 [INFO][3164] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.538 [INFO][3164] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.538 [INFO][3164] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.543 [WARNING][3164] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.543 [INFO][3164] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" HandleID="k8s-pod-network.aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" Workload="10.0.0.28-k8s-nginx--deployment--8587fbcb89--2qdgs-eth0" May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.544 [INFO][3164] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:18.546503 env[1206]: 2025-05-13 00:40:18.545 [INFO][3156] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9" May 13 00:40:18.546503 env[1206]: time="2025-05-13T00:40:18.546521750Z" level=info msg="TearDown network for sandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" successfully" May 13 00:40:18.551758 env[1206]: time="2025-05-13T00:40:18.551728553Z" level=info msg="RemovePodSandbox \"aaba7cebdaf4663a8a1b00c071005538869cfe228bffe060231ec8ef3dc0b6c9\" returns successfully" May 13 00:40:18.552213 env[1206]: time="2025-05-13T00:40:18.552194633Z" level=info msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.579 [WARNING][3187] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--cjlrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2f5de204-aa00-4a75-a752-0e7e97211ab2", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139", Pod:"csi-node-driver-cjlrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali652f099b00b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.579 [INFO][3187] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.580 [INFO][3187] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" iface="eth0" netns="" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.580 [INFO][3187] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.580 [INFO][3187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.595 [INFO][3195] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.596 [INFO][3195] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.596 [INFO][3195] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.600 [WARNING][3195] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.600 [INFO][3195] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.605 [INFO][3195] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:18.606872 env[1206]: 2025-05-13 00:40:18.606 [INFO][3187] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.607477 env[1206]: time="2025-05-13T00:40:18.606887092Z" level=info msg="TearDown network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" successfully" May 13 00:40:18.607477 env[1206]: time="2025-05-13T00:40:18.606917049Z" level=info msg="StopPodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" returns successfully" May 13 00:40:18.607477 env[1206]: time="2025-05-13T00:40:18.607355677Z" level=info msg="RemovePodSandbox for \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" May 13 00:40:18.607477 env[1206]: time="2025-05-13T00:40:18.607386185Z" level=info msg="Forcibly stopping sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\"" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.632 [WARNING][3219] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--cjlrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2f5de204-aa00-4a75-a752-0e7e97211ab2", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"b7678b5fe5b497396d40ada13e5b2b1ca2b3995ffec15181c6bc96c8affd8139", Pod:"csi-node-driver-cjlrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali652f099b00b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.632 [INFO][3219] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.632 [INFO][3219] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" iface="eth0" netns="" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.632 [INFO][3219] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.632 [INFO][3219] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.653 [INFO][3228] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.653 [INFO][3228] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.653 [INFO][3228] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.657 [WARNING][3228] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.657 [INFO][3228] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" HandleID="k8s-pod-network.33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" Workload="10.0.0.28-k8s-csi--node--driver--cjlrr-eth0" May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.659 [INFO][3228] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:40:18.661031 env[1206]: 2025-05-13 00:40:18.660 [INFO][3219] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273" May 13 00:40:18.661031 env[1206]: time="2025-05-13T00:40:18.660947672Z" level=info msg="TearDown network for sandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" successfully" May 13 00:40:18.663997 env[1206]: time="2025-05-13T00:40:18.663969528Z" level=info msg="RemovePodSandbox \"33eaf4aa346c485ea625981a8684291360f245f89631a969e38190abfe9ec273\" returns successfully" May 13 00:40:19.441085 kubelet[1454]: E0513 00:40:19.441022 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:20.442141 kubelet[1454]: E0513 00:40:20.442093 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:21.443166 kubelet[1454]: E0513 00:40:21.443112 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:22.443508 kubelet[1454]: E0513 00:40:22.443448 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"