May 13 00:43:53.837604 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:43:53.837620 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:43:53.837630 kernel: BIOS-provided physical RAM map: May 13 00:43:53.837635 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:43:53.837641 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:43:53.837646 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:43:53.837653 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:43:53.837658 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:43:53.837664 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:43:53.837670 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:43:53.837676 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 13 00:43:53.837681 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:43:53.837687 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:43:53.837692 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:43:53.837699 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:43:53.837707 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:43:53.837713 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:43:53.837718 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:43:53.837724 kernel: NX (Execute Disable) protection: active May 13 00:43:53.837730 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:43:53.837736 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:43:53.837742 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:43:53.837748 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:43:53.837753 kernel: extended physical RAM map: May 13 00:43:53.837759 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:43:53.837766 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:43:53.837772 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:43:53.837778 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:43:53.837784 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:43:53.837790 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:43:53.837796 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:43:53.837802 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 13 00:43:53.837809 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 13 00:43:53.837816 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 13 00:43:53.837822 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 13 00:43:53.837829 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 13 00:43:53.837837 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:43:53.837843 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:43:53.837849 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:43:53.837855 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:43:53.837863 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:43:53.837870 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:43:53.837876 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:43:53.837883 kernel: efi: EFI v2.70 by EDK II May 13 00:43:53.837890 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 13 00:43:53.837896 kernel: random: crng init done May 13 00:43:53.837902 kernel: SMBIOS 2.8 present. May 13 00:43:53.837909 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 13 00:43:53.837915 kernel: Hypervisor detected: KVM May 13 00:43:53.837921 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:43:53.837927 kernel: kvm-clock: cpu 0, msr 5d196001, primary cpu clock May 13 00:43:53.837934 kernel: kvm-clock: using sched offset of 3999494959 cycles May 13 00:43:53.837942 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:43:53.837949 kernel: tsc: Detected 2794.748 MHz processor May 13 00:43:53.837955 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:43:53.837962 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:43:53.837968 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 13 00:43:53.837975 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:43:53.837981 kernel: Using GB pages for direct mapping May 13 00:43:53.837988 kernel: Secure boot disabled May 13 00:43:53.837994 kernel: ACPI: Early table checksum verification disabled May 13 00:43:53.838002 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 13 00:43:53.838008 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 13 00:43:53.838015 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838021 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838028 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 13 00:43:53.838034 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838041 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838047 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838054 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:43:53.838062 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 13 00:43:53.838068 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 13 00:43:53.838075 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 13 00:43:53.838081 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 13 00:43:53.838088 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 13 00:43:53.838094 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 13 00:43:53.838100 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 13 00:43:53.838107 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 13 00:43:53.838120 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 13 00:43:53.838127 kernel: No NUMA configuration found May 13 00:43:53.838134 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 13 00:43:53.838140 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 13 00:43:53.838147 kernel: Zone ranges: May 13 00:43:53.838153 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:43:53.838160 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 13 00:43:53.838166 kernel: Normal empty May 13 00:43:53.838172 kernel: Movable zone start for each node May 13 00:43:53.838179 kernel: Early memory node ranges May 13 00:43:53.838187 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 13 00:43:53.838194 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 13 00:43:53.838200 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 13 00:43:53.838206 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 13 00:43:53.838213 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 13 00:43:53.838219 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 13 00:43:53.838225 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 13 00:43:53.838232 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:43:53.838238 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 13 00:43:53.838245 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 13 00:43:53.838252 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:43:53.838259 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 13 00:43:53.838265 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 13 00:43:53.838272 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 13 00:43:53.838278 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:43:53.838285 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:43:53.838291 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:43:53.838297 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:43:53.838304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:43:53.838311 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:43:53.838318 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:43:53.838324 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:43:53.838331 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:43:53.838337 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:43:53.838343 kernel: TSC deadline timer available May 13 00:43:53.838350 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:43:53.838460 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:43:53.838469 kernel: kvm-guest: setup PV sched yield May 13 00:43:53.838478 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 13 00:43:53.838484 kernel: Booting paravirtualized kernel on KVM May 13 00:43:53.838495 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:43:53.838504 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:43:53.838510 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:43:53.838517 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:43:53.838524 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:43:53.838530 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:43:53.838537 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 13 00:43:53.838544 kernel: kvm-guest: PV spinlocks enabled May 13 00:43:53.838563 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:43:53.838570 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 13 00:43:53.838579 kernel: Policy zone: DMA32 May 13 00:43:53.838587 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:43:53.838594 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:43:53.838601 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:43:53.838609 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:43:53.838616 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:43:53.838623 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 13 00:43:53.838630 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:43:53.838637 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:43:53.838644 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:43:53.838651 kernel: rcu: Hierarchical RCU implementation. May 13 00:43:53.838658 kernel: rcu: RCU event tracing is enabled. May 13 00:43:53.838665 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:43:53.838673 kernel: Rude variant of Tasks RCU enabled. May 13 00:43:53.838680 kernel: Tracing variant of Tasks RCU enabled. May 13 00:43:53.838687 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:43:53.838694 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:43:53.838700 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:43:53.838707 kernel: Console: colour dummy device 80x25 May 13 00:43:53.838714 kernel: printk: console [ttyS0] enabled May 13 00:43:53.838721 kernel: ACPI: Core revision 20210730 May 13 00:43:53.838728 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:43:53.838736 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:43:53.838742 kernel: x2apic enabled May 13 00:43:53.838749 kernel: Switched APIC routing to physical x2apic. May 13 00:43:53.838756 kernel: kvm-guest: setup PV IPIs May 13 00:43:53.838763 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:43:53.838769 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:43:53.838776 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 13 00:43:53.838783 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:43:53.838790 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:43:53.838798 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:43:53.838804 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:43:53.838811 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:43:53.838818 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:43:53.838825 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:43:53.838831 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:43:53.838838 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:43:53.838845 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:43:53.838852 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:43:53.838860 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:43:53.838867 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:43:53.838874 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:43:53.838880 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:43:53.838887 kernel: Freeing SMP alternatives memory: 32K May 13 00:43:53.838894 kernel: pid_max: default: 32768 minimum: 301 May 13 00:43:53.838900 kernel: LSM: Security Framework initializing May 13 00:43:53.838907 kernel: SELinux: Initializing. May 13 00:43:53.838914 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:43:53.838922 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:43:53.838929 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:43:53.838936 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:43:53.838943 kernel: ... version: 0 May 13 00:43:53.838949 kernel: ... bit width: 48 May 13 00:43:53.838956 kernel: ... generic registers: 6 May 13 00:43:53.838963 kernel: ... value mask: 0000ffffffffffff May 13 00:43:53.838969 kernel: ... max period: 00007fffffffffff May 13 00:43:53.838976 kernel: ... fixed-purpose events: 0 May 13 00:43:53.838984 kernel: ... event mask: 000000000000003f May 13 00:43:53.838990 kernel: signal: max sigframe size: 1776 May 13 00:43:53.838997 kernel: rcu: Hierarchical SRCU implementation. May 13 00:43:53.839004 kernel: smp: Bringing up secondary CPUs ... May 13 00:43:53.839010 kernel: x86: Booting SMP configuration: May 13 00:43:53.839017 kernel: .... node #0, CPUs: #1 May 13 00:43:53.839024 kernel: kvm-clock: cpu 1, msr 5d196041, secondary cpu clock May 13 00:43:53.839030 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:43:53.839037 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 13 00:43:53.839045 kernel: #2 May 13 00:43:53.839052 kernel: kvm-clock: cpu 2, msr 5d196081, secondary cpu clock May 13 00:43:53.839059 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:43:53.839066 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 13 00:43:53.839072 kernel: #3 May 13 00:43:53.839079 kernel: kvm-clock: cpu 3, msr 5d1960c1, secondary cpu clock May 13 00:43:53.839085 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:43:53.839092 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 13 00:43:53.839099 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:43:53.839105 kernel: smpboot: Max logical packages: 1 May 13 00:43:53.839121 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 13 00:43:53.839128 kernel: devtmpfs: initialized May 13 00:43:53.839135 kernel: x86/mm: Memory block size: 128MB May 13 00:43:53.839142 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 13 00:43:53.839148 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 13 00:43:53.839155 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 13 00:43:53.839162 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 13 00:43:53.839169 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 13 00:43:53.839176 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:43:53.839184 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:43:53.839191 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:43:53.839197 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:43:53.839204 kernel: audit: initializing netlink subsys (disabled) May 13 00:43:53.839211 kernel: audit: type=2000 audit(1747097033.180:1): state=initialized audit_enabled=0 res=1 May 13 00:43:53.839217 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:43:53.839224 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:43:53.839231 kernel: cpuidle: using governor menu May 13 00:43:53.839237 kernel: ACPI: bus type PCI registered May 13 00:43:53.839245 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:43:53.839252 kernel: dca service started, version 1.12.1 May 13 00:43:53.839259 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:43:53.839266 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:43:53.839272 kernel: PCI: Using configuration type 1 for base access May 13 00:43:53.839279 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:43:53.839286 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:43:53.839293 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:43:53.839301 kernel: ACPI: Added _OSI(Module Device) May 13 00:43:53.839307 kernel: ACPI: Added _OSI(Processor Device) May 13 00:43:53.839314 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:43:53.839321 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:43:53.839328 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:43:53.839334 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:43:53.839341 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:43:53.839348 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:43:53.839355 kernel: ACPI: Interpreter enabled May 13 00:43:53.839361 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:43:53.839369 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:43:53.839376 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:43:53.839383 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:43:53.839389 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:43:53.839503 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:43:53.839592 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:43:53.839660 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:43:53.839671 kernel: PCI host bridge to bus 0000:00 May 13 00:43:53.839749 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:43:53.839812 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:43:53.839871 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:43:53.839929 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:43:53.839995 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:43:53.840056 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 13 00:43:53.840125 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:43:53.840204 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:43:53.840279 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:43:53.840348 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 13 00:43:53.840419 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 13 00:43:53.840485 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 13 00:43:53.840561 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 13 00:43:53.840634 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:43:53.840710 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:43:53.840781 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 13 00:43:53.840849 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 13 00:43:53.840916 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 13 00:43:53.840994 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:43:53.841067 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 13 00:43:53.841143 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 13 00:43:53.841211 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 13 00:43:53.841287 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:43:53.841356 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 13 00:43:53.841425 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 13 00:43:53.841492 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 13 00:43:53.841577 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 13 00:43:53.841653 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:43:53.841722 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:43:53.841800 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:43:53.841868 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 13 00:43:53.841936 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 13 00:43:53.842008 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:43:53.842079 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 13 00:43:53.842088 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:43:53.842096 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:43:53.842103 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:43:53.842117 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:43:53.842124 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:43:53.842131 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:43:53.842138 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:43:53.842147 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:43:53.842154 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:43:53.842161 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:43:53.842168 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:43:53.842175 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:43:53.842182 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:43:53.842189 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:43:53.842196 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:43:53.842203 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:43:53.842210 kernel: iommu: Default domain type: Translated May 13 00:43:53.842218 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:43:53.842286 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:43:53.842353 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:43:53.842419 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:43:53.842428 kernel: vgaarb: loaded May 13 00:43:53.842435 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:43:53.842442 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:43:53.842449 kernel: PTP clock support registered May 13 00:43:53.842458 kernel: Registered efivars operations May 13 00:43:53.842465 kernel: PCI: Using ACPI for IRQ routing May 13 00:43:53.842472 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:43:53.842478 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 13 00:43:53.842485 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 13 00:43:53.842492 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 13 00:43:53.842498 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 13 00:43:53.842505 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 13 00:43:53.842512 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 13 00:43:53.842520 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:43:53.842527 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:43:53.842534 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:43:53.842541 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:43:53.842558 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:43:53.842565 kernel: pnp: PnP ACPI init May 13 00:43:53.842641 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:43:53.842651 kernel: pnp: PnP ACPI: found 6 devices May 13 00:43:53.842659 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:43:53.842666 kernel: NET: Registered PF_INET protocol family May 13 00:43:53.842673 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:43:53.842680 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:43:53.842687 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:43:53.842694 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:43:53.842701 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:43:53.842708 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:43:53.842716 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:43:53.842723 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:43:53.842730 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:43:53.842737 kernel: NET: Registered PF_XDP protocol family May 13 00:43:53.842807 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 13 00:43:53.842875 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 13 00:43:53.842955 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:43:53.843049 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:43:53.843710 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:43:53.843850 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:43:53.843912 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:43:53.843971 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 13 00:43:53.843980 kernel: PCI: CLS 0 bytes, default 64 May 13 00:43:53.843987 kernel: Initialise system trusted keyrings May 13 00:43:53.843994 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:43:53.844001 kernel: Key type asymmetric registered May 13 00:43:53.844008 kernel: Asymmetric key parser 'x509' registered May 13 00:43:53.844018 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:43:53.844025 kernel: io scheduler mq-deadline registered May 13 00:43:53.844042 kernel: io scheduler kyber registered May 13 00:43:53.844050 kernel: io scheduler bfq registered May 13 00:43:53.844057 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:43:53.844065 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:43:53.844072 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:43:53.844080 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:43:53.844087 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:43:53.844096 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:43:53.844103 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:43:53.844120 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:43:53.844128 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:43:53.844198 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:43:53.844209 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:43:53.844267 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:43:53.844330 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:43:53 UTC (1747097033) May 13 00:43:53.844393 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:43:53.844403 kernel: efifb: probing for efifb May 13 00:43:53.844410 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 13 00:43:53.844418 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 13 00:43:53.844425 kernel: efifb: scrolling: redraw May 13 00:43:53.844432 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 13 00:43:53.844439 kernel: Console: switching to colour frame buffer device 160x50 May 13 00:43:53.844446 kernel: fb0: EFI VGA frame buffer device May 13 00:43:53.844453 kernel: pstore: Registered efi as persistent store backend May 13 00:43:53.844462 kernel: NET: Registered PF_INET6 protocol family May 13 00:43:53.844469 kernel: Segment Routing with IPv6 May 13 00:43:53.844477 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:43:53.844485 kernel: NET: Registered PF_PACKET protocol family May 13 00:43:53.844493 kernel: Key type dns_resolver registered May 13 00:43:53.844500 kernel: IPI shorthand broadcast: enabled May 13 00:43:53.844508 kernel: sched_clock: Marking stable (415223189, 129205425)->(589822990, -45394376) May 13 00:43:53.844515 kernel: registered taskstats version 1 May 13 00:43:53.844523 kernel: Loading compiled-in X.509 certificates May 13 00:43:53.844530 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:43:53.844537 kernel: Key type .fscrypt registered May 13 00:43:53.844544 kernel: Key type fscrypt-provisioning registered May 13 00:43:53.844565 kernel: pstore: Using crash dump compression: deflate May 13 00:43:53.844572 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:43:53.844580 kernel: ima: Allocated hash algorithm: sha1 May 13 00:43:53.844588 kernel: ima: No architecture policies found May 13 00:43:53.844595 kernel: clk: Disabling unused clocks May 13 00:43:53.844602 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:43:53.844609 kernel: Write protecting the kernel read-only data: 28672k May 13 00:43:53.844616 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:43:53.844623 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:43:53.844630 kernel: Run /init as init process May 13 00:43:53.844646 kernel: with arguments: May 13 00:43:53.844654 kernel: /init May 13 00:43:53.844661 kernel: with environment: May 13 00:43:53.844668 kernel: HOME=/ May 13 00:43:53.844675 kernel: TERM=linux May 13 00:43:53.844682 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:43:53.844691 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:43:53.844700 systemd[1]: Detected virtualization kvm. May 13 00:43:53.844708 systemd[1]: Detected architecture x86-64. May 13 00:43:53.844717 systemd[1]: Running in initrd. May 13 00:43:53.844724 systemd[1]: No hostname configured, using default hostname. May 13 00:43:53.844732 systemd[1]: Hostname set to . May 13 00:43:53.844739 systemd[1]: Initializing machine ID from VM UUID. May 13 00:43:53.844747 systemd[1]: Queued start job for default target initrd.target. May 13 00:43:53.844754 systemd[1]: Started systemd-ask-password-console.path. May 13 00:43:53.844762 systemd[1]: Reached target cryptsetup.target. May 13 00:43:53.844777 systemd[1]: Reached target paths.target. May 13 00:43:53.844787 systemd[1]: Reached target slices.target. May 13 00:43:53.844794 systemd[1]: Reached target swap.target. May 13 00:43:53.844801 systemd[1]: Reached target timers.target. May 13 00:43:53.844810 systemd[1]: Listening on iscsid.socket. May 13 00:43:53.844817 systemd[1]: Listening on iscsiuio.socket. May 13 00:43:53.844825 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:43:53.844832 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:43:53.844840 systemd[1]: Listening on systemd-journald.socket. May 13 00:43:53.844849 systemd[1]: Listening on systemd-networkd.socket. May 13 00:43:53.844856 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:43:53.844864 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:43:53.844871 systemd[1]: Reached target sockets.target. May 13 00:43:53.844879 systemd[1]: Starting kmod-static-nodes.service... May 13 00:43:53.844886 systemd[1]: Finished network-cleanup.service. May 13 00:43:53.844894 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:43:53.844902 systemd[1]: Starting systemd-journald.service... May 13 00:43:53.844909 systemd[1]: Starting systemd-modules-load.service... May 13 00:43:53.844918 systemd[1]: Starting systemd-resolved.service... May 13 00:43:53.844925 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:43:53.844933 systemd[1]: Finished kmod-static-nodes.service. May 13 00:43:53.844941 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:43:53.844948 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:43:53.844956 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:43:53.844966 systemd-journald[197]: Journal started May 13 00:43:53.845005 systemd-journald[197]: Runtime Journal (/run/log/journal/f270e74488a84df0bab3b9be4fa541dd) is 6.0M, max 48.4M, 42.4M free. May 13 00:43:53.844793 systemd-modules-load[198]: Inserted module 'overlay' May 13 00:43:53.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.849580 kernel: audit: type=1130 audit(1747097033.845:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.849635 systemd[1]: Started systemd-journald.service. May 13 00:43:53.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.851234 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:43:53.859302 kernel: audit: type=1130 audit(1747097033.850:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.859325 kernel: audit: type=1130 audit(1747097033.853:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.855045 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:43:53.869488 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:43:53.869649 systemd-resolved[199]: Positive Trust Anchors: May 13 00:43:53.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.869662 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:43:53.881372 kernel: audit: type=1130 audit(1747097033.869:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.881417 kernel: audit: type=1130 audit(1747097033.875:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.881498 dracut-cmdline[216]: dracut-dracut-053 May 13 00:43:53.869689 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:43:53.889532 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:43:53.889661 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:43:53.871024 systemd[1]: Starting dracut-cmdline.service... May 13 00:43:53.895686 kernel: Bridge firewalling registered May 13 00:43:53.871801 systemd-resolved[199]: Defaulting to hostname 'linux'. May 13 00:43:53.872495 systemd[1]: Started systemd-resolved.service. May 13 00:43:53.876427 systemd[1]: Reached target nss-lookup.target. May 13 00:43:53.895599 systemd-modules-load[198]: Inserted module 'br_netfilter' May 13 00:43:53.912572 kernel: SCSI subsystem initialized May 13 00:43:53.924666 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:43:53.924705 kernel: device-mapper: uevent: version 1.0.3 May 13 00:43:53.924715 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:43:53.927265 systemd-modules-load[198]: Inserted module 'dm_multipath' May 13 00:43:53.927980 systemd[1]: Finished systemd-modules-load.service. May 13 00:43:53.933407 kernel: audit: type=1130 audit(1747097033.928:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.929649 systemd[1]: Starting systemd-sysctl.service... May 13 00:43:53.935568 kernel: Loading iSCSI transport class v2.0-870. May 13 00:43:53.938311 systemd[1]: Finished systemd-sysctl.service. May 13 00:43:53.942710 kernel: audit: type=1130 audit(1747097033.938:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:53.952575 kernel: iscsi: registered transport (tcp) May 13 00:43:53.973874 kernel: iscsi: registered transport (qla4xxx) May 13 00:43:53.973889 kernel: QLogic iSCSI HBA Driver May 13 00:43:54.001480 systemd[1]: Finished dracut-cmdline.service. May 13 00:43:54.007072 kernel: audit: type=1130 audit(1747097034.001:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.003529 systemd[1]: Starting dracut-pre-udev.service... May 13 00:43:54.048598 kernel: raid6: avx2x4 gen() 29928 MB/s May 13 00:43:54.065595 kernel: raid6: avx2x4 xor() 7201 MB/s May 13 00:43:54.082596 kernel: raid6: avx2x2 gen() 32247 MB/s May 13 00:43:54.099613 kernel: raid6: avx2x2 xor() 19155 MB/s May 13 00:43:54.116588 kernel: raid6: avx2x1 gen() 26512 MB/s May 13 00:43:54.133574 kernel: raid6: avx2x1 xor() 15277 MB/s May 13 00:43:54.150580 kernel: raid6: sse2x4 gen() 14828 MB/s May 13 00:43:54.167577 kernel: raid6: sse2x4 xor() 7074 MB/s May 13 00:43:54.211576 kernel: raid6: sse2x2 gen() 16192 MB/s May 13 00:43:54.228584 kernel: raid6: sse2x2 xor() 9755 MB/s May 13 00:43:54.245574 kernel: raid6: sse2x1 gen() 12401 MB/s May 13 00:43:54.262961 kernel: raid6: sse2x1 xor() 7786 MB/s May 13 00:43:54.263003 kernel: raid6: using algorithm avx2x2 gen() 32247 MB/s May 13 00:43:54.263012 kernel: raid6: .... xor() 19155 MB/s, rmw enabled May 13 00:43:54.263675 kernel: raid6: using avx2x2 recovery algorithm May 13 00:43:54.275578 kernel: xor: automatically using best checksumming function avx May 13 00:43:54.363592 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:43:54.371181 systemd[1]: Finished dracut-pre-udev.service. May 13 00:43:54.406895 kernel: audit: type=1130 audit(1747097034.370:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.406000 audit: BPF prog-id=7 op=LOAD May 13 00:43:54.406000 audit: BPF prog-id=8 op=LOAD May 13 00:43:54.407201 systemd[1]: Starting systemd-udevd.service... May 13 00:43:54.418739 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 13 00:43:54.422131 systemd[1]: Started systemd-udevd.service. May 13 00:43:54.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.423967 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:43:54.432905 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 13 00:43:54.454381 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:43:54.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.457101 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:43:54.489162 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:43:54.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:54.517570 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:43:54.534521 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:43:54.534534 kernel: libata version 3.00 loaded. May 13 00:43:54.534543 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:43:54.534564 kernel: AES CTR mode by8 optimization enabled May 13 00:43:54.534573 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:43:54.534582 kernel: GPT:9289727 != 19775487 May 13 00:43:54.534594 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:43:54.534603 kernel: GPT:9289727 != 19775487 May 13 00:43:54.534611 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:43:54.534620 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:43:54.545761 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:43:54.562389 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:43:54.562404 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:43:54.562505 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:43:54.562646 kernel: scsi host0: ahci May 13 00:43:54.562752 kernel: scsi host1: ahci May 13 00:43:54.562852 kernel: scsi host2: ahci May 13 00:43:54.562945 kernel: scsi host3: ahci May 13 00:43:54.563037 kernel: scsi host4: ahci May 13 00:43:54.563132 kernel: scsi host5: ahci May 13 00:43:54.563223 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 13 00:43:54.563233 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 13 00:43:54.563243 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 13 00:43:54.563252 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) May 13 00:43:54.563261 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 13 00:43:54.563269 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 13 00:43:54.563277 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 13 00:43:54.558112 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:43:54.567540 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:43:54.574038 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:43:54.579846 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:43:54.583361 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:43:54.584233 systemd[1]: Starting disk-uuid.service... May 13 00:43:54.717286 disk-uuid[528]: Primary Header is updated. May 13 00:43:54.717286 disk-uuid[528]: Secondary Entries is updated. May 13 00:43:54.717286 disk-uuid[528]: Secondary Header is updated. May 13 00:43:54.721907 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:43:54.727624 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:43:54.869586 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:43:54.869652 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:43:54.877579 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:43:54.877611 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:43:54.878580 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:43:54.879580 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:43:54.881131 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:43:54.881142 kernel: ata3.00: applying bridge limits May 13 00:43:54.882578 kernel: ata3.00: configured for UDMA/100 May 13 00:43:54.886526 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:43:54.916973 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:43:54.934415 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:43:54.934431 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:43:55.727427 disk-uuid[530]: The operation has completed successfully. May 13 00:43:55.728857 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:43:55.748100 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:43:55.748177 systemd[1]: Finished disk-uuid.service. May 13 00:43:55.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.758932 systemd[1]: Starting verity-setup.service... May 13 00:43:55.770578 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:43:55.788947 systemd[1]: Found device dev-mapper-usr.device. May 13 00:43:55.791127 systemd[1]: Mounting sysusr-usr.mount... May 13 00:43:55.793166 systemd[1]: Finished verity-setup.service. May 13 00:43:55.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.850451 systemd[1]: Mounted sysusr-usr.mount. May 13 00:43:55.851992 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:43:55.851027 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:43:55.851860 systemd[1]: Starting ignition-setup.service... May 13 00:43:55.854210 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:43:55.860995 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:43:55.861026 kernel: BTRFS info (device vda6): using free space tree May 13 00:43:55.861039 kernel: BTRFS info (device vda6): has skinny extents May 13 00:43:55.870411 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:43:55.877605 systemd[1]: Finished ignition-setup.service. May 13 00:43:55.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.879971 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:43:55.919424 ignition[637]: Ignition 2.14.0 May 13 00:43:55.919434 ignition[637]: Stage: fetch-offline May 13 00:43:55.919481 ignition[637]: no configs at "/usr/lib/ignition/base.d" May 13 00:43:55.919501 ignition[637]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:55.919624 ignition[637]: parsed url from cmdline: "" May 13 00:43:55.919627 ignition[637]: no config URL provided May 13 00:43:55.919633 ignition[637]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:43:55.919640 ignition[637]: no config at "/usr/lib/ignition/user.ign" May 13 00:43:55.919659 ignition[637]: op(1): [started] loading QEMU firmware config module May 13 00:43:55.919664 ignition[637]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:43:55.924160 ignition[637]: op(1): [finished] loading QEMU firmware config module May 13 00:43:55.926167 ignition[637]: parsing config with SHA512: 6184fbc339d02578e139f50f12409de7823a3601f1f6acdf6e7b2a0c12abc4b28eeacfea5adb805f38373b35dc4126d31a48e500fc046b66f85a573fbada0e9a May 13 00:43:55.933249 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:43:55.934366 unknown[637]: fetched base config from "system" May 13 00:43:55.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.934000 audit: BPF prog-id=9 op=LOAD May 13 00:43:55.934755 ignition[637]: fetch-offline: fetch-offline passed May 13 00:43:55.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.934374 unknown[637]: fetched user config from "qemu" May 13 00:43:55.934816 ignition[637]: Ignition finished successfully May 13 00:43:55.935717 systemd[1]: Starting systemd-networkd.service... May 13 00:43:55.937176 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:43:55.957412 systemd-networkd[722]: lo: Link UP May 13 00:43:55.957421 systemd-networkd[722]: lo: Gained carrier May 13 00:43:55.957910 systemd-networkd[722]: Enumeration completed May 13 00:43:55.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.957978 systemd[1]: Started systemd-networkd.service. May 13 00:43:55.958156 systemd-networkd[722]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:43:55.959092 systemd-networkd[722]: eth0: Link UP May 13 00:43:55.959095 systemd-networkd[722]: eth0: Gained carrier May 13 00:43:55.960577 systemd[1]: Reached target network.target. May 13 00:43:55.962307 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:43:55.963042 systemd[1]: Starting ignition-kargs.service... May 13 00:43:55.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.964643 systemd[1]: Starting iscsiuio.service... May 13 00:43:55.969901 systemd[1]: Started iscsiuio.service. May 13 00:43:55.973700 ignition[724]: Ignition 2.14.0 May 13 00:43:55.972622 systemd[1]: Starting iscsid.service... May 13 00:43:55.976030 iscsid[733]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:43:55.976030 iscsid[733]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 13 00:43:55.976030 iscsid[733]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:43:55.976030 iscsid[733]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:43:55.976030 iscsid[733]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:43:55.976030 iscsid[733]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:43:55.976030 iscsid[733]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:43:55.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.973706 ignition[724]: Stage: kargs May 13 00:43:55.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:55.975478 systemd[1]: Finished ignition-kargs.service. May 13 00:43:55.973782 ignition[724]: no configs at "/usr/lib/ignition/base.d" May 13 00:43:55.976652 systemd-networkd[722]: eth0: DHCPv4 address 10.0.0.85/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:43:55.973791 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:55.986361 systemd[1]: Started iscsid.service. May 13 00:43:55.974476 ignition[724]: kargs: kargs passed May 13 00:43:55.974511 ignition[724]: Ignition finished successfully May 13 00:43:55.996271 systemd[1]: Starting dracut-initqueue.service... May 13 00:43:55.998476 systemd[1]: Starting ignition-disks.service... May 13 00:43:56.005757 ignition[735]: Ignition 2.14.0 May 13 00:43:56.006394 ignition[735]: Stage: disks May 13 00:43:56.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.006753 systemd[1]: Finished dracut-initqueue.service. May 13 00:43:56.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.006480 ignition[735]: no configs at "/usr/lib/ignition/base.d" May 13 00:43:56.008299 systemd[1]: Finished ignition-disks.service. May 13 00:43:56.006489 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:56.010794 systemd[1]: Reached target initrd-root-device.target. May 13 00:43:56.007202 ignition[735]: disks: disks passed May 13 00:43:56.012397 systemd[1]: Reached target local-fs-pre.target. May 13 00:43:56.007236 ignition[735]: Ignition finished successfully May 13 00:43:56.014237 systemd[1]: Reached target local-fs.target. May 13 00:43:56.015854 systemd[1]: Reached target remote-fs-pre.target. May 13 00:43:56.017292 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:43:56.018911 systemd[1]: Reached target remote-fs.target. May 13 00:43:56.020456 systemd[1]: Reached target sysinit.target. May 13 00:43:56.024543 systemd[1]: Reached target basic.target. May 13 00:43:56.026724 systemd[1]: Starting dracut-pre-mount.service... May 13 00:43:56.033804 systemd[1]: Finished dracut-pre-mount.service. May 13 00:43:56.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.036024 systemd[1]: Starting systemd-fsck-root.service... May 13 00:43:56.045039 systemd-fsck[755]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:43:56.050233 systemd[1]: Finished systemd-fsck-root.service. May 13 00:43:56.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.053074 systemd[1]: Mounting sysroot.mount... May 13 00:43:56.061597 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:43:56.062000 systemd[1]: Mounted sysroot.mount. May 13 00:43:56.062452 systemd[1]: Reached target initrd-root-fs.target. May 13 00:43:56.064960 systemd[1]: Mounting sysroot-usr.mount... May 13 00:43:56.065630 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:43:56.065662 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:43:56.065680 systemd[1]: Reached target ignition-diskful.target. May 13 00:43:56.073213 systemd[1]: Mounted sysroot-usr.mount. May 13 00:43:56.074332 systemd[1]: Starting initrd-setup-root.service... May 13 00:43:56.078298 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:43:56.081896 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory May 13 00:43:56.085777 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:43:56.089801 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:43:56.117936 systemd[1]: Finished initrd-setup-root.service. May 13 00:43:56.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.120448 systemd[1]: Starting ignition-mount.service... May 13 00:43:56.122692 systemd[1]: Starting sysroot-boot.service... May 13 00:43:56.126495 bash[806]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:43:56.134056 ignition[807]: INFO : Ignition 2.14.0 May 13 00:43:56.134056 ignition[807]: INFO : Stage: mount May 13 00:43:56.135785 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:43:56.135785 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:56.135785 ignition[807]: INFO : mount: mount passed May 13 00:43:56.135785 ignition[807]: INFO : Ignition finished successfully May 13 00:43:56.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.135464 systemd[1]: Finished ignition-mount.service. May 13 00:43:56.146698 systemd[1]: Finished sysroot-boot.service. May 13 00:43:56.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:56.801810 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:43:56.819700 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) May 13 00:43:56.819737 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:43:56.819747 kernel: BTRFS info (device vda6): using free space tree May 13 00:43:56.820684 kernel: BTRFS info (device vda6): has skinny extents May 13 00:43:56.825085 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:43:56.827680 systemd[1]: Starting ignition-files.service... May 13 00:43:56.841129 ignition[837]: INFO : Ignition 2.14.0 May 13 00:43:56.841129 ignition[837]: INFO : Stage: files May 13 00:43:56.842937 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:43:56.842937 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:56.845742 ignition[837]: DEBUG : files: compiled without relabeling support, skipping May 13 00:43:56.847193 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:43:56.847193 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:43:56.850256 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:43:56.851648 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:43:56.853431 unknown[837]: wrote ssh authorized keys file for user: core May 13 00:43:56.854572 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:43:56.856082 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 13 00:43:56.857893 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:43:56.859762 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:43:56.861567 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:43:56.863290 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:56.865728 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:56.868259 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:56.870277 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 00:43:57.269633 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 13 00:43:57.668138 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:43:57.668138 ignition[837]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 13 00:43:57.672204 ignition[837]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:43:57.672204 ignition[837]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:43:57.672204 ignition[837]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 13 00:43:57.672204 ignition[837]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:43:57.672204 ignition[837]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:43:57.695274 ignition[837]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:43:57.696937 ignition[837]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:43:57.698502 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:43:57.700351 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:43:57.702236 ignition[837]: INFO : files: files passed May 13 00:43:57.702236 ignition[837]: INFO : Ignition finished successfully May 13 00:43:57.705343 systemd[1]: Finished ignition-files.service. May 13 00:43:57.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.706385 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:43:57.707422 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:43:57.707898 systemd[1]: Starting ignition-quench.service... May 13 00:43:57.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.710346 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:43:57.710411 systemd[1]: Finished ignition-quench.service. May 13 00:43:57.717630 initrd-setup-root-after-ignition[863]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:43:57.720772 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:43:57.721264 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:43:57.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.721581 systemd[1]: Reached target ignition-complete.target. May 13 00:43:57.725887 systemd[1]: Starting initrd-parse-etc.service... May 13 00:43:57.738841 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:43:57.738929 systemd[1]: Finished initrd-parse-etc.service. May 13 00:43:57.740696 systemd[1]: Reached target initrd-fs.target. May 13 00:43:57.741159 systemd[1]: Reached target initrd.target. May 13 00:43:57.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.741514 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:43:57.742108 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:43:57.752233 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:43:57.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.753150 systemd[1]: Starting initrd-cleanup.service... May 13 00:43:57.760954 systemd[1]: Stopped target nss-lookup.target. May 13 00:43:57.761486 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:43:57.762821 systemd[1]: Stopped target timers.target. May 13 00:43:57.763174 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:43:57.763262 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:43:57.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.763612 systemd[1]: Stopped target initrd.target. May 13 00:43:57.767790 systemd[1]: Stopped target basic.target. May 13 00:43:57.769200 systemd[1]: Stopped target ignition-complete.target. May 13 00:43:57.770685 systemd[1]: Stopped target ignition-diskful.target. May 13 00:43:57.771231 systemd[1]: Stopped target initrd-root-device.target. May 13 00:43:57.773274 systemd[1]: Stopped target remote-fs.target. May 13 00:43:57.774865 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:43:57.776390 systemd[1]: Stopped target sysinit.target. May 13 00:43:57.777836 systemd[1]: Stopped target local-fs.target. May 13 00:43:57.779285 systemd[1]: Stopped target local-fs-pre.target. May 13 00:43:57.780824 systemd[1]: Stopped target swap.target. May 13 00:43:57.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.782075 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:43:57.782165 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:43:57.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.783544 systemd[1]: Stopped target cryptsetup.target. May 13 00:43:57.784836 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:43:57.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.784917 systemd[1]: Stopped dracut-initqueue.service. May 13 00:43:57.785218 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:43:57.785296 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:43:57.787979 systemd[1]: Stopped target paths.target. May 13 00:43:57.788227 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:43:57.793079 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:43:57.796569 systemd[1]: Stopped target slices.target. May 13 00:43:57.798117 systemd[1]: Stopped target sockets.target. May 13 00:43:57.799704 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:43:57.800708 systemd[1]: Closed iscsid.socket. May 13 00:43:57.802145 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:43:57.802215 systemd[1]: Closed iscsiuio.socket. May 13 00:43:57.804444 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:43:57.805637 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:43:57.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.807662 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:43:57.807744 systemd[1]: Stopped ignition-files.service. May 13 00:43:57.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.810951 systemd[1]: Stopping ignition-mount.service... May 13 00:43:57.813002 systemd[1]: Stopping sysroot-boot.service... May 13 00:43:57.814571 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:43:57.814801 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:43:57.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.818362 ignition[878]: INFO : Ignition 2.14.0 May 13 00:43:57.818362 ignition[878]: INFO : Stage: umount May 13 00:43:57.818362 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:43:57.818362 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:43:57.818362 ignition[878]: INFO : umount: umount passed May 13 00:43:57.818362 ignition[878]: INFO : Ignition finished successfully May 13 00:43:57.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.816883 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:43:57.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.817066 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:43:57.820873 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:43:57.820978 systemd[1]: Stopped ignition-mount.service. May 13 00:43:57.822935 systemd[1]: Stopped target network.target. May 13 00:43:57.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.824583 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:43:57.824630 systemd[1]: Stopped ignition-disks.service. May 13 00:43:57.826194 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:43:57.826232 systemd[1]: Stopped ignition-kargs.service. May 13 00:43:57.828049 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:43:57.828084 systemd[1]: Stopped ignition-setup.service. May 13 00:43:57.828670 systemd[1]: Stopping systemd-networkd.service... May 13 00:43:57.828835 systemd[1]: Stopping systemd-resolved.service... May 13 00:43:57.829716 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:43:57.830145 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:43:57.830206 systemd[1]: Finished initrd-cleanup.service. May 13 00:43:57.833606 systemd-networkd[722]: eth0: DHCPv6 lease lost May 13 00:43:57.846000 audit: BPF prog-id=9 op=UNLOAD May 13 00:43:57.835148 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:43:57.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.835234 systemd[1]: Stopped systemd-networkd.service. May 13 00:43:57.836831 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:43:57.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.836856 systemd[1]: Closed systemd-networkd.socket. May 13 00:43:57.847475 systemd[1]: Stopping network-cleanup.service... May 13 00:43:57.849124 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:43:57.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.849170 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:43:57.851066 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:43:57.851098 systemd[1]: Stopped systemd-sysctl.service. May 13 00:43:57.853827 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:43:57.853861 systemd[1]: Stopped systemd-modules-load.service. May 13 00:43:57.857266 systemd[1]: Stopping systemd-udevd.service... May 13 00:43:57.863893 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:43:57.865599 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:43:57.866812 systemd[1]: Stopped systemd-resolved.service. May 13 00:43:57.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.869306 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:43:57.870385 systemd[1]: Stopped systemd-udevd.service. May 13 00:43:57.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.872000 audit: BPF prog-id=6 op=UNLOAD May 13 00:43:57.873373 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:43:57.873422 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:43:57.876320 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:43:57.876346 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:43:57.878877 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:43:57.878916 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:43:57.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.881600 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:43:57.881633 systemd[1]: Stopped dracut-cmdline.service. May 13 00:43:57.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.884117 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:43:57.884150 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:43:57.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.887239 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:43:57.888986 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:43:57.889037 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:43:57.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.891964 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:43:57.892011 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:43:57.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.894508 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:43:57.894538 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:43:57.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.897890 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:43:57.899733 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:43:57.900702 systemd[1]: Stopped sysroot-boot.service. May 13 00:43:57.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.902298 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:43:57.903264 systemd[1]: Stopped network-cleanup.service. May 13 00:43:57.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.904939 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:43:57.906051 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:43:57.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.907908 systemd[1]: Reached target initrd-switch-root.target. May 13 00:43:57.909758 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:43:57.909800 systemd[1]: Stopped initrd-setup-root.service. May 13 00:43:57.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:43:57.912837 systemd[1]: Starting initrd-switch-root.service... May 13 00:43:57.928688 systemd[1]: Switching root. May 13 00:43:57.948627 iscsid[733]: iscsid shutting down. May 13 00:43:57.949404 systemd-journald[197]: Journal stopped May 13 00:44:00.559488 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). May 13 00:44:00.559540 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:44:00.559566 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:44:00.559576 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:44:00.559588 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:44:00.559597 kernel: SELinux: policy capability open_perms=1 May 13 00:44:00.559610 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:44:00.559621 kernel: SELinux: policy capability always_check_network=0 May 13 00:44:00.559631 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:44:00.559640 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:44:00.559649 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:44:00.559658 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:44:00.559670 systemd[1]: Successfully loaded SELinux policy in 37.681ms. May 13 00:44:00.559686 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.433ms. May 13 00:44:00.559697 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:44:00.559708 systemd[1]: Detected virtualization kvm. May 13 00:44:00.559718 systemd[1]: Detected architecture x86-64. May 13 00:44:00.559728 systemd[1]: Detected first boot. May 13 00:44:00.559738 systemd[1]: Initializing machine ID from VM UUID. May 13 00:44:00.559747 kernel: kauditd_printk_skb: 64 callbacks suppressed May 13 00:44:00.559761 kernel: audit: type=1400 audit(1747097038.248:75): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:44:00.559772 kernel: audit: type=1400 audit(1747097038.248:76): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:44:00.559781 kernel: audit: type=1334 audit(1747097038.252:77): prog-id=10 op=LOAD May 13 00:44:00.559790 kernel: audit: type=1334 audit(1747097038.252:78): prog-id=10 op=UNLOAD May 13 00:44:00.559800 kernel: audit: type=1334 audit(1747097038.256:79): prog-id=11 op=LOAD May 13 00:44:00.559809 kernel: audit: type=1334 audit(1747097038.256:80): prog-id=11 op=UNLOAD May 13 00:44:00.559818 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:44:00.559831 kernel: audit: type=1400 audit(1747097038.287:81): avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:44:00.559843 kernel: audit: type=1300 audit(1747097038.287:81): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:00.559853 kernel: audit: type=1327 audit(1747097038.287:81): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:44:00.559864 kernel: audit: type=1400 audit(1747097038.288:82): avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:44:00.559874 systemd[1]: Populated /etc with preset unit settings. May 13 00:44:00.559884 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:44:00.559895 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:44:00.559906 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:44:00.559926 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:44:00.559936 systemd[1]: Stopped iscsiuio.service. May 13 00:44:00.559946 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:44:00.559956 systemd[1]: Stopped iscsid.service. May 13 00:44:00.559966 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:44:00.559976 systemd[1]: Stopped initrd-switch-root.service. May 13 00:44:00.559988 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:44:00.560000 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:44:00.560010 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:44:00.560019 systemd[1]: Created slice system-getty.slice. May 13 00:44:00.560029 systemd[1]: Created slice system-modprobe.slice. May 13 00:44:00.560039 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:44:00.560049 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:44:00.560059 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:44:00.560070 systemd[1]: Created slice user.slice. May 13 00:44:00.560080 systemd[1]: Started systemd-ask-password-console.path. May 13 00:44:00.560089 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:44:00.560101 systemd[1]: Set up automount boot.automount. May 13 00:44:00.560114 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:44:00.560129 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:44:00.560145 systemd[1]: Stopped target initrd-fs.target. May 13 00:44:00.560158 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:44:00.560171 systemd[1]: Reached target integritysetup.target. May 13 00:44:00.560181 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:44:00.560192 systemd[1]: Reached target remote-fs.target. May 13 00:44:00.560202 systemd[1]: Reached target slices.target. May 13 00:44:00.560212 systemd[1]: Reached target swap.target. May 13 00:44:00.560222 systemd[1]: Reached target torcx.target. May 13 00:44:00.560232 systemd[1]: Reached target veritysetup.target. May 13 00:44:00.560243 systemd[1]: Listening on systemd-coredump.socket. May 13 00:44:00.560253 systemd[1]: Listening on systemd-initctl.socket. May 13 00:44:00.560263 systemd[1]: Listening on systemd-networkd.socket. May 13 00:44:00.560273 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:44:00.560283 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:44:00.560294 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:44:00.560304 systemd[1]: Mounting dev-hugepages.mount... May 13 00:44:00.560314 systemd[1]: Mounting dev-mqueue.mount... May 13 00:44:00.560323 systemd[1]: Mounting media.mount... May 13 00:44:00.560335 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:00.560345 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:44:00.560355 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:44:00.560365 systemd[1]: Mounting tmp.mount... May 13 00:44:00.560375 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:44:00.560385 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:00.560395 systemd[1]: Starting kmod-static-nodes.service... May 13 00:44:00.560405 systemd[1]: Starting modprobe@configfs.service... May 13 00:44:00.560414 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:00.560426 systemd[1]: Starting modprobe@drm.service... May 13 00:44:00.560436 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:00.560446 systemd[1]: Starting modprobe@fuse.service... May 13 00:44:00.560456 systemd[1]: Starting modprobe@loop.service... May 13 00:44:00.560467 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:44:00.560477 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:44:00.560487 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:44:00.560497 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:44:00.560507 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:44:00.560518 systemd[1]: Stopped systemd-journald.service. May 13 00:44:00.560528 kernel: loop: module loaded May 13 00:44:00.560537 kernel: fuse: init (API version 7.34) May 13 00:44:00.560546 systemd[1]: Starting systemd-journald.service... May 13 00:44:00.560569 systemd[1]: Starting systemd-modules-load.service... May 13 00:44:00.560579 systemd[1]: Starting systemd-network-generator.service... May 13 00:44:00.560589 systemd[1]: Starting systemd-remount-fs.service... May 13 00:44:00.560600 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:44:00.560610 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:44:00.560620 systemd[1]: Stopped verity-setup.service. May 13 00:44:00.560632 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:00.560642 systemd[1]: Mounted dev-hugepages.mount. May 13 00:44:00.560652 systemd[1]: Mounted dev-mqueue.mount. May 13 00:44:00.560664 systemd-journald[988]: Journal started May 13 00:44:00.560700 systemd-journald[988]: Runtime Journal (/run/log/journal/f270e74488a84df0bab3b9be4fa541dd) is 6.0M, max 48.4M, 42.4M free. May 13 00:43:58.005000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:43:58.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:43:58.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:43:58.252000 audit: BPF prog-id=10 op=LOAD May 13 00:43:58.252000 audit: BPF prog-id=10 op=UNLOAD May 13 00:43:58.256000 audit: BPF prog-id=11 op=LOAD May 13 00:43:58.256000 audit: BPF prog-id=11 op=UNLOAD May 13 00:43:58.287000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:43:58.287000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.287000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:43:58.288000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:43:58.288000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:43:58.288000 audit: CWD cwd="/" May 13 00:43:58.288000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:58.288000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:43:58.288000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:44:00.418000 audit: BPF prog-id=12 op=LOAD May 13 00:44:00.418000 audit: BPF prog-id=3 op=UNLOAD May 13 00:44:00.418000 audit: BPF prog-id=13 op=LOAD May 13 00:44:00.418000 audit: BPF prog-id=14 op=LOAD May 13 00:44:00.418000 audit: BPF prog-id=4 op=UNLOAD May 13 00:44:00.418000 audit: BPF prog-id=5 op=UNLOAD May 13 00:44:00.419000 audit: BPF prog-id=15 op=LOAD May 13 00:44:00.419000 audit: BPF prog-id=12 op=UNLOAD May 13 00:44:00.419000 audit: BPF prog-id=16 op=LOAD May 13 00:44:00.419000 audit: BPF prog-id=17 op=LOAD May 13 00:44:00.419000 audit: BPF prog-id=13 op=UNLOAD May 13 00:44:00.419000 audit: BPF prog-id=14 op=UNLOAD May 13 00:44:00.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.429000 audit: BPF prog-id=15 op=UNLOAD May 13 00:44:00.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.538000 audit: BPF prog-id=18 op=LOAD May 13 00:44:00.538000 audit: BPF prog-id=19 op=LOAD May 13 00:44:00.538000 audit: BPF prog-id=20 op=LOAD May 13 00:44:00.538000 audit: BPF prog-id=16 op=UNLOAD May 13 00:44:00.538000 audit: BPF prog-id=17 op=UNLOAD May 13 00:44:00.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.557000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:44:00.557000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe406aadd0 a2=4000 a3=7ffe406aae6c items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:00.557000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:44:00.417020 systemd[1]: Queued start job for default target multi-user.target. May 13 00:43:58.286069 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:44:00.417032 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:43:58.286298 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:44:00.420879 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:43:58.286317 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:43:58.286344 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:43:58.286353 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:43:58.286381 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:43:58.286392 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:43:58.286581 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:43:58.286612 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:44:00.562583 systemd[1]: Started systemd-journald.service. May 13 00:43:58.286623 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:43:58.287137 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:43:58.287171 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:43:58.287187 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:43:58.287200 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:43:58.287214 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:43:58.287225 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:43:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:44:00.160601 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:00.160839 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:00.160935 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:00.161082 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:00.161125 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:44:00.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.161176 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:44:00.563846 systemd[1]: Mounted media.mount. May 13 00:44:00.564633 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:44:00.565491 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:44:00.566392 systemd[1]: Mounted tmp.mount. May 13 00:44:00.567401 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:44:00.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.568498 systemd[1]: Finished kmod-static-nodes.service. May 13 00:44:00.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.569536 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:44:00.569754 systemd[1]: Finished modprobe@configfs.service. May 13 00:44:00.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.570821 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:00.570972 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:00.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.572008 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:44:00.572160 systemd[1]: Finished modprobe@drm.service. May 13 00:44:00.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.573269 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:00.573492 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:00.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.574602 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:44:00.574742 systemd[1]: Finished modprobe@fuse.service. May 13 00:44:00.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.575728 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:00.575883 systemd[1]: Finished modprobe@loop.service. May 13 00:44:00.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.576939 systemd[1]: Finished systemd-modules-load.service. May 13 00:44:00.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.578063 systemd[1]: Finished systemd-network-generator.service. May 13 00:44:00.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.579216 systemd[1]: Finished systemd-remount-fs.service. May 13 00:44:00.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.580484 systemd[1]: Reached target network-pre.target. May 13 00:44:00.582290 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:44:00.584018 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:44:00.585075 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:44:00.586703 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:44:00.588809 systemd[1]: Starting systemd-journal-flush.service... May 13 00:44:00.589882 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:00.590791 systemd[1]: Starting systemd-random-seed.service... May 13 00:44:00.591930 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:00.592814 systemd[1]: Starting systemd-sysctl.service... May 13 00:44:00.594618 systemd[1]: Starting systemd-sysusers.service... May 13 00:44:00.598251 systemd-journald[988]: Time spent on flushing to /var/log/journal/f270e74488a84df0bab3b9be4fa541dd is 13.309ms for 1146 entries. May 13 00:44:00.598251 systemd-journald[988]: System Journal (/var/log/journal/f270e74488a84df0bab3b9be4fa541dd) is 8.0M, max 195.6M, 187.6M free. May 13 00:44:00.809746 systemd-journald[988]: Received client request to flush runtime journal. May 13 00:44:00.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:00.597289 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:44:00.599933 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:44:00.810137 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 13 00:44:00.610698 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:44:00.612721 systemd[1]: Starting systemd-udev-settle.service... May 13 00:44:00.643187 systemd[1]: Finished systemd-sysusers.service. May 13 00:44:00.644327 systemd[1]: Finished systemd-sysctl.service. May 13 00:44:00.646151 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:44:00.662173 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:44:00.697974 systemd[1]: Finished systemd-random-seed.service. May 13 00:44:00.702922 systemd[1]: Reached target first-boot-complete.target. May 13 00:44:00.810878 systemd[1]: Finished systemd-journal-flush.service. May 13 00:44:00.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.326448 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:44:01.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.327000 audit: BPF prog-id=21 op=LOAD May 13 00:44:01.327000 audit: BPF prog-id=22 op=LOAD May 13 00:44:01.327000 audit: BPF prog-id=7 op=UNLOAD May 13 00:44:01.327000 audit: BPF prog-id=8 op=UNLOAD May 13 00:44:01.328714 systemd[1]: Starting systemd-udevd.service... May 13 00:44:01.343826 systemd-udevd[1019]: Using default interface naming scheme 'v252'. May 13 00:44:01.356087 systemd[1]: Started systemd-udevd.service. May 13 00:44:01.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.357000 audit: BPF prog-id=23 op=LOAD May 13 00:44:01.359024 systemd[1]: Starting systemd-networkd.service... May 13 00:44:01.362000 audit: BPF prog-id=24 op=LOAD May 13 00:44:01.362000 audit: BPF prog-id=25 op=LOAD May 13 00:44:01.362000 audit: BPF prog-id=26 op=LOAD May 13 00:44:01.363334 systemd[1]: Starting systemd-userdbd.service... May 13 00:44:01.391642 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:44:01.396089 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:44:01.397615 systemd[1]: Started systemd-userdbd.service. May 13 00:44:01.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.427587 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:44:01.431576 kernel: ACPI: button: Power Button [PWRF] May 13 00:44:01.444223 systemd-networkd[1029]: lo: Link UP May 13 00:44:01.444520 systemd-networkd[1029]: lo: Gained carrier May 13 00:44:01.445159 systemd-networkd[1029]: Enumeration completed May 13 00:44:01.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.445443 systemd[1]: Started systemd-networkd.service. May 13 00:44:01.447338 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:44:01.448586 systemd-networkd[1029]: eth0: Link UP May 13 00:44:01.448663 systemd-networkd[1029]: eth0: Gained carrier May 13 00:44:01.449000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:44:01.449000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cd2b6f4ac0 a1=338ac a2=7fe361c49bc5 a3=5 items=110 ppid=1019 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:01.449000 audit: CWD cwd="/" May 13 00:44:01.449000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=1 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=2 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=3 name=(null) inode=15703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=4 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=5 name=(null) inode=15704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=6 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=7 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=8 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=9 name=(null) inode=15706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=10 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=11 name=(null) inode=15707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=12 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=13 name=(null) inode=15708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=14 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=15 name=(null) inode=15709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=16 name=(null) inode=15705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=17 name=(null) inode=15710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=18 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=19 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=20 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=21 name=(null) inode=15712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=22 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=23 name=(null) inode=15713 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=24 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=25 name=(null) inode=15714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=26 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=27 name=(null) inode=15715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=28 name=(null) inode=15711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=29 name=(null) inode=15716 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=30 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=31 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=32 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=33 name=(null) inode=15718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=34 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=35 name=(null) inode=15719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=36 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=37 name=(null) inode=15720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=38 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=39 name=(null) inode=15721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=40 name=(null) inode=15717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=41 name=(null) inode=15722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=42 name=(null) inode=15702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=43 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=44 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=45 name=(null) inode=15724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=46 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=47 name=(null) inode=15725 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=48 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=49 name=(null) inode=15726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=50 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=51 name=(null) inode=15727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=52 name=(null) inode=15723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=53 name=(null) inode=15728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=55 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=56 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=57 name=(null) inode=15730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=58 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=59 name=(null) inode=15731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=60 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=61 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=62 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=63 name=(null) inode=15733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=64 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=65 name=(null) inode=15734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=66 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=67 name=(null) inode=15735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.460701 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.85/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:44:01.449000 audit: PATH item=68 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=69 name=(null) inode=15736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=70 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=71 name=(null) inode=15737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=72 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=73 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=74 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=75 name=(null) inode=15739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=76 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=77 name=(null) inode=15740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=78 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=79 name=(null) inode=15741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=80 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=81 name=(null) inode=15742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=82 name=(null) inode=15738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=83 name=(null) inode=15743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=84 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=85 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=86 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=87 name=(null) inode=15745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=88 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=89 name=(null) inode=15746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=90 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=91 name=(null) inode=15747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=92 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=93 name=(null) inode=15748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=94 name=(null) inode=15744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=95 name=(null) inode=15749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=96 name=(null) inode=15729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=97 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=98 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=99 name=(null) inode=15751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=100 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=101 name=(null) inode=15752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=102 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=103 name=(null) inode=15753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=104 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=105 name=(null) inode=15754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=106 name=(null) inode=15750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=107 name=(null) inode=15755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PATH item=109 name=(null) inode=15756 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:01.449000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:44:01.465589 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:44:01.469959 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 13 00:44:01.472464 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:44:01.472591 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:44:01.472704 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:44:01.498576 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:44:01.535805 kernel: kvm: Nested Virtualization enabled May 13 00:44:01.535908 kernel: SVM: kvm: Nested Paging enabled May 13 00:44:01.535950 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:44:01.537040 kernel: SVM: Virtual GIF supported May 13 00:44:01.551604 kernel: EDAC MC: Ver: 3.0.0 May 13 00:44:01.575970 systemd[1]: Finished systemd-udev-settle.service. May 13 00:44:01.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.578020 systemd[1]: Starting lvm2-activation-early.service... May 13 00:44:01.584708 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:44:01.611668 systemd[1]: Finished lvm2-activation-early.service. May 13 00:44:01.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.612676 systemd[1]: Reached target cryptsetup.target. May 13 00:44:01.614487 systemd[1]: Starting lvm2-activation.service... May 13 00:44:01.618248 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:44:01.642422 systemd[1]: Finished lvm2-activation.service. May 13 00:44:01.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.643317 systemd[1]: Reached target local-fs-pre.target. May 13 00:44:01.644148 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:44:01.644165 systemd[1]: Reached target local-fs.target. May 13 00:44:01.644950 systemd[1]: Reached target machines.target. May 13 00:44:01.646564 systemd[1]: Starting ldconfig.service... May 13 00:44:01.647566 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:01.647604 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:01.648381 systemd[1]: Starting systemd-boot-update.service... May 13 00:44:01.650634 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:44:01.652889 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:44:01.655067 systemd[1]: Starting systemd-sysext.service... May 13 00:44:01.656169 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) May 13 00:44:01.657385 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:44:01.665831 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:44:01.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.667039 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:44:01.669998 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:44:01.670184 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:44:01.682596 kernel: loop0: detected capacity change from 0 to 205544 May 13 00:44:01.699449 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) May 13 00:44:01.699449 systemd-fsck[1066]: /dev/vda1: 791 files, 120712/258078 clusters May 13 00:44:01.701536 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:44:01.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.705198 systemd[1]: Mounting boot.mount... May 13 00:44:01.905640 systemd[1]: Mounted boot.mount. May 13 00:44:01.918580 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:44:01.965373 systemd[1]: Finished systemd-boot-update.service. May 13 00:44:01.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:01.979572 kernel: loop1: detected capacity change from 0 to 205544 May 13 00:44:01.983274 (sd-sysext)[1072]: Using extensions 'kubernetes'. May 13 00:44:01.983578 (sd-sysext)[1072]: Merged extensions into '/usr'. May 13 00:44:01.998420 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:01.999703 systemd[1]: Mounting usr-share-oem.mount... May 13 00:44:02.000646 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:02.001767 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:02.003418 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:02.005074 systemd[1]: Starting modprobe@loop.service... May 13 00:44:02.005975 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:02.006075 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.006176 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:02.008445 systemd[1]: Mounted usr-share-oem.mount. May 13 00:44:02.010526 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:44:02.035541 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:02.035697 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:02.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.037005 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:02.037118 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:02.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.038296 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:02.038404 systemd[1]: Finished modprobe@loop.service. May 13 00:44:02.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.039651 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:02.039722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:02.040675 systemd[1]: Finished systemd-sysext.service. May 13 00:44:02.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.042935 systemd[1]: Starting ensure-sysext.service... May 13 00:44:02.044476 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:44:02.049883 systemd[1]: Reloading. May 13 00:44:02.055004 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:44:02.056001 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:44:02.057297 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:44:02.103231 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-05-13T00:44:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:44:02.103877 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-05-13T00:44:02Z" level=info msg="torcx already run" May 13 00:44:02.226040 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:44:02.226058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:44:02.242453 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:44:02.290394 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:44:02.291000 audit: BPF prog-id=27 op=LOAD May 13 00:44:02.291000 audit: BPF prog-id=28 op=LOAD May 13 00:44:02.291000 audit: BPF prog-id=21 op=UNLOAD May 13 00:44:02.291000 audit: BPF prog-id=22 op=UNLOAD May 13 00:44:02.293000 audit: BPF prog-id=29 op=LOAD May 13 00:44:02.293000 audit: BPF prog-id=23 op=UNLOAD May 13 00:44:02.294000 audit: BPF prog-id=30 op=LOAD May 13 00:44:02.294000 audit: BPF prog-id=24 op=UNLOAD May 13 00:44:02.294000 audit: BPF prog-id=31 op=LOAD May 13 00:44:02.294000 audit: BPF prog-id=32 op=LOAD May 13 00:44:02.294000 audit: BPF prog-id=25 op=UNLOAD May 13 00:44:02.294000 audit: BPF prog-id=26 op=UNLOAD May 13 00:44:02.294000 audit: BPF prog-id=33 op=LOAD May 13 00:44:02.294000 audit: BPF prog-id=18 op=UNLOAD May 13 00:44:02.295000 audit: BPF prog-id=34 op=LOAD May 13 00:44:02.295000 audit: BPF prog-id=35 op=LOAD May 13 00:44:02.295000 audit: BPF prog-id=19 op=UNLOAD May 13 00:44:02.295000 audit: BPF prog-id=20 op=UNLOAD May 13 00:44:02.298040 systemd[1]: Finished ldconfig.service. May 13 00:44:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.299157 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:44:02.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.301150 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:44:02.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.304678 systemd[1]: Starting audit-rules.service... May 13 00:44:02.306343 systemd[1]: Starting clean-ca-certificates.service... May 13 00:44:02.308410 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:44:02.310000 audit: BPF prog-id=36 op=LOAD May 13 00:44:02.311476 systemd[1]: Starting systemd-resolved.service... May 13 00:44:02.312000 audit: BPF prog-id=37 op=LOAD May 13 00:44:02.313727 systemd[1]: Starting systemd-timesyncd.service... May 13 00:44:02.315636 systemd[1]: Starting systemd-update-utmp.service... May 13 00:44:02.317036 systemd[1]: Finished clean-ca-certificates.service. May 13 00:44:02.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.319000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:44:02.319802 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:02.323959 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:02.326008 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:02.328333 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:02.330534 systemd[1]: Starting modprobe@loop.service... May 13 00:44:02.331704 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:02.332167 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.332377 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:02.334430 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:02.334710 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:02.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.336480 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:44:02.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:02.337000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:44:02.337000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5a80a3c0 a2=420 a3=0 items=0 ppid=1141 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:02.337000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:44:02.338295 augenrules[1164]: No rules May 13 00:44:02.338284 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:02.338403 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:02.340405 systemd[1]: Finished audit-rules.service. May 13 00:44:02.342134 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:02.342277 systemd[1]: Finished modprobe@loop.service. May 13 00:44:02.345057 systemd[1]: Finished systemd-update-utmp.service. May 13 00:44:02.348423 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:02.349692 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:02.351460 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:02.353367 systemd[1]: Starting modprobe@loop.service... May 13 00:44:02.354256 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:02.354372 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.355485 systemd[1]: Starting systemd-update-done.service... May 13 00:44:02.356446 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:02.357207 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:02.357306 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:02.358600 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:02.358695 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:02.360008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:02.361943 systemd[1]: Finished systemd-update-done.service. May 13 00:44:02.363374 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:02.364451 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:02.366258 systemd[1]: Starting modprobe@drm.service... May 13 00:44:02.368150 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:02.369139 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:02.369248 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.370327 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:44:02.371311 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:02.372202 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:02.372305 systemd[1]: Finished modprobe@loop.service. May 13 00:44:02.373455 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:02.373582 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:02.374864 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:44:02.374975 systemd[1]: Finished modprobe@drm.service. May 13 00:44:02.376091 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:02.376203 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:02.377603 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:02.377707 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:02.378770 systemd[1]: Finished ensure-sysext.service. May 13 00:44:02.388514 systemd[1]: Started systemd-timesyncd.service. May 13 00:44:02.389473 systemd[1]: Reached target time-set.target. May 13 00:44:02.390034 systemd-timesyncd[1151]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:44:02.390076 systemd-timesyncd[1151]: Initial clock synchronization to Tue 2025-05-13 00:44:02.543447 UTC. May 13 00:44:02.397422 systemd-resolved[1150]: Positive Trust Anchors: May 13 00:44:02.397437 systemd-resolved[1150]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:44:02.397464 systemd-resolved[1150]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:44:02.404023 systemd-resolved[1150]: Defaulting to hostname 'linux'. May 13 00:44:02.405254 systemd[1]: Started systemd-resolved.service. May 13 00:44:02.406143 systemd[1]: Reached target network.target. May 13 00:44:02.406933 systemd[1]: Reached target nss-lookup.target. May 13 00:44:02.407736 systemd[1]: Reached target sysinit.target. May 13 00:44:02.408601 systemd[1]: Started motdgen.path. May 13 00:44:02.409310 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:44:02.410505 systemd[1]: Started logrotate.timer. May 13 00:44:02.411296 systemd[1]: Started mdadm.timer. May 13 00:44:02.411961 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:44:02.412784 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:44:02.412806 systemd[1]: Reached target paths.target. May 13 00:44:02.413533 systemd[1]: Reached target timers.target. May 13 00:44:02.414587 systemd[1]: Listening on dbus.socket. May 13 00:44:02.416230 systemd[1]: Starting docker.socket... May 13 00:44:02.418816 systemd[1]: Listening on sshd.socket. May 13 00:44:02.419653 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.419975 systemd[1]: Listening on docker.socket. May 13 00:44:02.420767 systemd[1]: Reached target sockets.target. May 13 00:44:02.421572 systemd[1]: Reached target basic.target. May 13 00:44:02.422352 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:44:02.422374 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:44:02.423170 systemd[1]: Starting containerd.service... May 13 00:44:02.424711 systemd[1]: Starting dbus.service... May 13 00:44:02.426134 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:44:02.427898 systemd[1]: Starting extend-filesystems.service... May 13 00:44:02.428871 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:44:02.429776 systemd[1]: Starting motdgen.service... May 13 00:44:02.431298 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:44:02.434639 jq[1182]: false May 13 00:44:02.433078 systemd[1]: Starting sshd-keygen.service... May 13 00:44:02.435949 systemd[1]: Starting systemd-logind.service... May 13 00:44:02.436782 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:02.436833 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:44:02.437170 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:44:02.437971 systemd[1]: Starting update-engine.service... May 13 00:44:02.439524 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:44:02.441958 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:44:02.443067 jq[1194]: true May 13 00:44:02.442106 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:44:02.442596 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:44:02.442708 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:44:02.449847 extend-filesystems[1183]: Found loop1 May 13 00:44:02.450895 extend-filesystems[1183]: Found sr0 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda May 13 00:44:02.450895 extend-filesystems[1183]: Found vda1 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda2 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda3 May 13 00:44:02.450895 extend-filesystems[1183]: Found usr May 13 00:44:02.450895 extend-filesystems[1183]: Found vda4 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda6 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda7 May 13 00:44:02.450895 extend-filesystems[1183]: Found vda9 May 13 00:44:02.450895 extend-filesystems[1183]: Checking size of /dev/vda9 May 13 00:44:02.461128 jq[1196]: true May 13 00:44:02.472611 update_engine[1193]: I0513 00:44:02.469833 1193 main.cc:92] Flatcar Update Engine starting May 13 00:44:02.462886 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:44:02.464966 dbus-daemon[1181]: [system] SELinux support is enabled May 13 00:44:02.476905 update_engine[1193]: I0513 00:44:02.473565 1193 update_check_scheduler.cc:74] Next update check in 11m51s May 13 00:44:02.463025 systemd[1]: Finished motdgen.service. May 13 00:44:02.465536 systemd[1]: Started dbus.service. May 13 00:44:02.468016 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:44:02.468034 systemd[1]: Reached target system-config.target. May 13 00:44:02.469079 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:44:02.469092 systemd[1]: Reached target user-config.target. May 13 00:44:02.473082 systemd[1]: Started update-engine.service. May 13 00:44:02.475477 systemd[1]: Started locksmithd.service. May 13 00:44:02.487171 env[1197]: time="2025-05-13T00:44:02.487128274Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:44:02.493045 systemd-logind[1190]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:44:02.493069 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:44:02.493394 systemd-logind[1190]: New seat seat0. May 13 00:44:02.495738 systemd[1]: Started systemd-logind.service. May 13 00:44:02.503113 extend-filesystems[1183]: Resized partition /dev/vda9 May 13 00:44:02.514185 env[1197]: time="2025-05-13T00:44:02.514132446Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:44:02.514313 env[1197]: time="2025-05-13T00:44:02.514286485Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.515733 env[1197]: time="2025-05-13T00:44:02.515700988Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:02.515733 env[1197]: time="2025-05-13T00:44:02.515729282Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.515939 env[1197]: time="2025-05-13T00:44:02.515914589Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:02.515939 env[1197]: time="2025-05-13T00:44:02.515934086Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.516007 env[1197]: time="2025-05-13T00:44:02.515945457Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:44:02.516007 env[1197]: time="2025-05-13T00:44:02.515954243Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.516046 env[1197]: time="2025-05-13T00:44:02.516009056Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.516208 env[1197]: time="2025-05-13T00:44:02.516184425Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:02.516322 env[1197]: time="2025-05-13T00:44:02.516296616Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:02.516322 env[1197]: time="2025-05-13T00:44:02.516316653Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:44:02.516388 env[1197]: time="2025-05-13T00:44:02.516353853Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:44:02.516388 env[1197]: time="2025-05-13T00:44:02.516364243Z" level=info msg="metadata content store policy set" policy=shared May 13 00:44:02.526595 extend-filesystems[1235]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:44:02.540147 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:44:02.557675 locksmithd[1226]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:44:02.562061 env[1197]: time="2025-05-13T00:44:02.562018978Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:44:02.583414 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562062089Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562078750Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562127551Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562141618Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562154492Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562165232Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562238840Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562252566Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562263657Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562274617Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:44:02.583449 env[1197]: time="2025-05-13T00:44:02.562285748Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:44:02.583903 env[1197]: time="2025-05-13T00:44:02.583494880Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:44:02.583903 env[1197]: time="2025-05-13T00:44:02.583647256Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:44:02.583958 extend-filesystems[1235]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:44:02.583958 extend-filesystems[1235]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:44:02.583958 extend-filesystems[1235]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:44:02.589447 extend-filesystems[1183]: Resized filesystem in /dev/vda9 May 13 00:44:02.590453 bash[1225]: Updated "/home/core/.ssh/authorized_keys" May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.583967056Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.584949669Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.584972472Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585041942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585054506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585065557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585075776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585148612Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585174892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585185602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585198416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585211400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585345792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585361662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:44:02.590600 env[1197]: time="2025-05-13T00:44:02.585372322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:44:02.584279 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:44:02.591253 env[1197]: time="2025-05-13T00:44:02.585382040Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:44:02.591253 env[1197]: time="2025-05-13T00:44:02.585410494Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:44:02.591253 env[1197]: time="2025-05-13T00:44:02.585420192Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:44:02.591253 env[1197]: time="2025-05-13T00:44:02.585436653Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:44:02.591253 env[1197]: time="2025-05-13T00:44:02.585467951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:44:02.584433 systemd[1]: Finished extend-filesystems.service. May 13 00:44:02.587274 systemd[1]: Started containerd.service. May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.585675100Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.585732948Z" level=info msg="Connect containerd service" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.585756292Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586324247Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586437350Z" level=info msg="Start subscribing containerd event" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586474650Z" level=info msg="Start recovering state" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586518602Z" level=info msg="Start event monitor" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586529993Z" level=info msg="Start snapshots syncer" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586537588Z" level=info msg="Start cni network conf syncer for default" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586544030Z" level=info msg="Start streaming server" May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.586819116Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.587185222Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:44:02.591477 env[1197]: time="2025-05-13T00:44:02.588615054Z" level=info msg="containerd successfully booted in 0.102448s" May 13 00:44:02.591132 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:44:02.670571 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:02.670628 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:02.822134 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:44:02.840199 systemd[1]: Finished sshd-keygen.service. May 13 00:44:02.842374 systemd[1]: Starting issuegen.service... May 13 00:44:02.846951 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:44:02.847065 systemd[1]: Finished issuegen.service. May 13 00:44:02.849009 systemd[1]: Starting systemd-user-sessions.service... May 13 00:44:02.854141 systemd[1]: Finished systemd-user-sessions.service. May 13 00:44:02.856109 systemd[1]: Started getty@tty1.service. May 13 00:44:02.857825 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:44:02.858871 systemd[1]: Reached target getty.target. May 13 00:44:03.152344 systemd-networkd[1029]: eth0: Gained IPv6LL May 13 00:44:03.154059 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:44:03.155865 systemd[1]: Reached target network-online.target. May 13 00:44:03.158762 systemd[1]: Starting kubelet.service... May 13 00:44:03.716859 systemd[1]: Started kubelet.service. May 13 00:44:03.718153 systemd[1]: Reached target multi-user.target. May 13 00:44:03.720192 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:44:03.726610 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:44:03.726786 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:44:03.728103 systemd[1]: Startup finished in 600ms (kernel) + 4.261s (initrd) + 5.761s (userspace) = 10.624s. May 13 00:44:04.125115 kubelet[1259]: E0513 00:44:04.124996 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:44:04.126808 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:44:04.126925 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:44:06.116143 systemd[1]: Created slice system-sshd.slice. May 13 00:44:06.117162 systemd[1]: Started sshd@0-10.0.0.85:22-10.0.0.1:50880.service. May 13 00:44:06.155095 sshd[1268]: Accepted publickey for core from 10.0.0.1 port 50880 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.156665 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.166091 systemd-logind[1190]: New session 1 of user core. May 13 00:44:06.167260 systemd[1]: Created slice user-500.slice. May 13 00:44:06.168622 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:44:06.177310 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:44:06.179081 systemd[1]: Starting user@500.service... May 13 00:44:06.181475 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.251652 systemd[1271]: Queued start job for default target default.target. May 13 00:44:06.252047 systemd[1271]: Reached target paths.target. May 13 00:44:06.252063 systemd[1271]: Reached target sockets.target. May 13 00:44:06.252074 systemd[1271]: Reached target timers.target. May 13 00:44:06.252085 systemd[1271]: Reached target basic.target. May 13 00:44:06.252118 systemd[1271]: Reached target default.target. May 13 00:44:06.252138 systemd[1271]: Startup finished in 65ms. May 13 00:44:06.252320 systemd[1]: Started user@500.service. May 13 00:44:06.253338 systemd[1]: Started session-1.scope. May 13 00:44:06.304951 systemd[1]: Started sshd@1-10.0.0.85:22-10.0.0.1:50896.service. May 13 00:44:06.338383 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 50896 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.339436 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.343616 systemd-logind[1190]: New session 2 of user core. May 13 00:44:06.344638 systemd[1]: Started session-2.scope. May 13 00:44:06.399697 sshd[1280]: pam_unix(sshd:session): session closed for user core May 13 00:44:06.402257 systemd[1]: sshd@1-10.0.0.85:22-10.0.0.1:50896.service: Deactivated successfully. May 13 00:44:06.402757 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:44:06.403619 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. May 13 00:44:06.404630 systemd[1]: Started sshd@2-10.0.0.85:22-10.0.0.1:50912.service. May 13 00:44:06.405433 systemd-logind[1190]: Removed session 2. May 13 00:44:06.434710 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 50912 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.435709 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.439101 systemd-logind[1190]: New session 3 of user core. May 13 00:44:06.439929 systemd[1]: Started session-3.scope. May 13 00:44:06.489847 sshd[1286]: pam_unix(sshd:session): session closed for user core May 13 00:44:06.493299 systemd[1]: sshd@2-10.0.0.85:22-10.0.0.1:50912.service: Deactivated successfully. May 13 00:44:06.493951 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:44:06.494526 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. May 13 00:44:06.495778 systemd[1]: Started sshd@3-10.0.0.85:22-10.0.0.1:50922.service. May 13 00:44:06.497023 systemd-logind[1190]: Removed session 3. May 13 00:44:06.525933 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 50922 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.526933 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.529954 systemd-logind[1190]: New session 4 of user core. May 13 00:44:06.530695 systemd[1]: Started session-4.scope. May 13 00:44:06.584113 sshd[1292]: pam_unix(sshd:session): session closed for user core May 13 00:44:06.587184 systemd[1]: sshd@3-10.0.0.85:22-10.0.0.1:50922.service: Deactivated successfully. May 13 00:44:06.587725 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:44:06.588223 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. May 13 00:44:06.589160 systemd[1]: Started sshd@4-10.0.0.85:22-10.0.0.1:50932.service. May 13 00:44:06.589907 systemd-logind[1190]: Removed session 4. May 13 00:44:06.620815 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 50932 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.621802 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.624807 systemd-logind[1190]: New session 5 of user core. May 13 00:44:06.625501 systemd[1]: Started session-5.scope. May 13 00:44:06.678891 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:44:06.679070 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:06.688777 dbus-daemon[1181]: \xd0=\xa1\x9e\x8aU: received setenforce notice (enforcing=-183393264) May 13 00:44:06.690496 sudo[1302]: pam_unix(sudo:session): session closed for user root May 13 00:44:06.692144 sshd[1298]: pam_unix(sshd:session): session closed for user core May 13 00:44:06.694655 systemd[1]: sshd@4-10.0.0.85:22-10.0.0.1:50932.service: Deactivated successfully. May 13 00:44:06.695157 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:44:06.695674 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. May 13 00:44:06.696490 systemd[1]: Started sshd@5-10.0.0.85:22-10.0.0.1:50944.service. May 13 00:44:06.697192 systemd-logind[1190]: Removed session 5. May 13 00:44:06.727228 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 50944 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.728315 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.731676 systemd-logind[1190]: New session 6 of user core. May 13 00:44:06.732387 systemd[1]: Started session-6.scope. May 13 00:44:06.784003 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:44:06.784201 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:06.786493 sudo[1310]: pam_unix(sudo:session): session closed for user root May 13 00:44:06.791667 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:44:06.791916 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:06.799503 systemd[1]: Stopping audit-rules.service... May 13 00:44:06.800000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:44:06.800754 auditctl[1313]: No rules May 13 00:44:06.801119 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:44:06.801286 systemd[1]: Stopped audit-rules.service. May 13 00:44:06.804650 kernel: kauditd_printk_skb: 230 callbacks suppressed May 13 00:44:06.804731 kernel: audit: type=1305 audit(1747097046.800:191): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:44:06.804751 kernel: audit: type=1300 audit(1747097046.800:191): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe02dbe040 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:06.800000 audit[1313]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe02dbe040 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:06.802961 systemd[1]: Starting audit-rules.service... May 13 00:44:06.800000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:44:06.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.813018 kernel: audit: type=1327 audit(1747097046.800:191): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:44:06.813054 kernel: audit: type=1131 audit(1747097046.800:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.817614 augenrules[1330]: No rules May 13 00:44:06.818170 systemd[1]: Finished audit-rules.service. May 13 00:44:06.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.818889 sudo[1309]: pam_unix(sudo:session): session closed for user root May 13 00:44:06.820232 sshd[1306]: pam_unix(sshd:session): session closed for user core May 13 00:44:06.817000 audit[1309]: USER_END pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.823597 systemd[1]: sshd@5-10.0.0.85:22-10.0.0.1:50944.service: Deactivated successfully. May 13 00:44:06.824049 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:44:06.824524 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. May 13 00:44:06.825361 kernel: audit: type=1130 audit(1747097046.816:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.825417 kernel: audit: type=1106 audit(1747097046.817:194): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.825436 kernel: audit: type=1104 audit(1747097046.817:195): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.817000 audit[1309]: CRED_DISP pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.825422 systemd[1]: Started sshd@6-10.0.0.85:22-10.0.0.1:50958.service. May 13 00:44:06.826367 systemd-logind[1190]: Removed session 6. May 13 00:44:06.828579 kernel: audit: type=1106 audit(1747097046.819:196): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.819000 audit[1306]: USER_END pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.819000 audit[1306]: CRED_DISP pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.836268 kernel: audit: type=1104 audit(1747097046.819:197): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.836308 kernel: audit: type=1131 audit(1747097046.822:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.85:22-10.0.0.1:50944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.85:22-10.0.0.1:50944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.85:22-10.0.0.1:50958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.861000 audit[1336]: USER_ACCT pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.861873 sshd[1336]: Accepted publickey for core from 10.0.0.1 port 50958 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:44:06.861000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.862000 audit[1336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91593720 a2=3 a3=0 items=0 ppid=1 pid=1336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:06.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:06.862854 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:06.865875 systemd-logind[1190]: New session 7 of user core. May 13 00:44:06.866585 systemd[1]: Started session-7.scope. May 13 00:44:06.869000 audit[1336]: USER_START pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.870000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:06.916000 audit[1339]: USER_ACCT pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.916000 audit[1339]: CRED_REFR pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.917158 sudo[1339]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:44:06.917334 sudo[1339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:06.918000 audit[1339]: USER_START pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:06.928433 systemd[1]: Starting coreos-metadata.service... May 13 00:44:06.934462 systemd[1]: coreos-metadata.service: Deactivated successfully. May 13 00:44:06.934630 systemd[1]: Finished coreos-metadata.service. May 13 00:44:06.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:06.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:07.348927 systemd[1]: Stopped kubelet.service. May 13 00:44:07.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:07.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:07.350771 systemd[1]: Starting kubelet.service... May 13 00:44:07.370245 systemd[1]: Reloading. May 13 00:44:07.443811 /usr/lib/systemd/system-generators/torcx-generator[1399]: time="2025-05-13T00:44:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:44:07.444097 /usr/lib/systemd/system-generators/torcx-generator[1399]: time="2025-05-13T00:44:07Z" level=info msg="torcx already run" May 13 00:44:08.221704 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:44:08.221719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:44:08.238326 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit: BPF prog-id=43 op=LOAD May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit: BPF prog-id=44 op=LOAD May 13 00:44:08.293000 audit: BPF prog-id=27 op=UNLOAD May 13 00:44:08.293000 audit: BPF prog-id=28 op=UNLOAD May 13 00:44:08.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit: BPF prog-id=45 op=LOAD May 13 00:44:08.294000 audit: BPF prog-id=41 op=UNLOAD May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.294000 audit: BPF prog-id=46 op=LOAD May 13 00:44:08.294000 audit: BPF prog-id=37 op=UNLOAD May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit: BPF prog-id=47 op=LOAD May 13 00:44:08.296000 audit: BPF prog-id=29 op=UNLOAD May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit: BPF prog-id=48 op=LOAD May 13 00:44:08.297000 audit: BPF prog-id=38 op=UNLOAD May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit: BPF prog-id=49 op=LOAD May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.297000 audit: BPF prog-id=50 op=LOAD May 13 00:44:08.297000 audit: BPF prog-id=39 op=UNLOAD May 13 00:44:08.297000 audit: BPF prog-id=40 op=UNLOAD May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit: BPF prog-id=51 op=LOAD May 13 00:44:08.298000 audit: BPF prog-id=30 op=UNLOAD May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit: BPF prog-id=52 op=LOAD May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit: BPF prog-id=53 op=LOAD May 13 00:44:08.298000 audit: BPF prog-id=31 op=UNLOAD May 13 00:44:08.298000 audit: BPF prog-id=32 op=UNLOAD May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit: BPF prog-id=54 op=LOAD May 13 00:44:08.299000 audit: BPF prog-id=33 op=UNLOAD May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit: BPF prog-id=55 op=LOAD May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.299000 audit: BPF prog-id=56 op=LOAD May 13 00:44:08.299000 audit: BPF prog-id=34 op=UNLOAD May 13 00:44:08.299000 audit: BPF prog-id=35 op=UNLOAD May 13 00:44:08.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.300000 audit: BPF prog-id=57 op=LOAD May 13 00:44:08.300000 audit: BPF prog-id=36 op=UNLOAD May 13 00:44:08.309422 systemd[1]: Started kubelet.service. May 13 00:44:08.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:08.310465 systemd[1]: Stopping kubelet.service... May 13 00:44:08.310690 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:44:08.310825 systemd[1]: Stopped kubelet.service. May 13 00:44:08.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:08.312011 systemd[1]: Starting kubelet.service... May 13 00:44:08.389941 systemd[1]: Started kubelet.service. May 13 00:44:08.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:08.424970 kubelet[1444]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:44:08.424970 kubelet[1444]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:44:08.424970 kubelet[1444]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:44:08.426010 kubelet[1444]: I0513 00:44:08.425964 1444 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:44:08.672553 kubelet[1444]: I0513 00:44:08.672441 1444 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:44:08.672553 kubelet[1444]: I0513 00:44:08.672474 1444 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:44:08.672737 kubelet[1444]: I0513 00:44:08.672715 1444 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:44:08.687871 kubelet[1444]: I0513 00:44:08.687843 1444 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:44:08.693743 kubelet[1444]: E0513 00:44:08.693689 1444 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:44:08.693743 kubelet[1444]: I0513 00:44:08.693730 1444 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:44:08.698444 kubelet[1444]: I0513 00:44:08.698418 1444 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:44:08.699304 kubelet[1444]: I0513 00:44:08.699281 1444 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:44:08.699429 kubelet[1444]: I0513 00:44:08.699400 1444 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:44:08.699596 kubelet[1444]: I0513 00:44:08.699424 1444 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.85","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:44:08.699691 kubelet[1444]: I0513 00:44:08.699606 1444 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:44:08.699691 kubelet[1444]: I0513 00:44:08.699615 1444 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:44:08.699735 kubelet[1444]: I0513 00:44:08.699708 1444 state_mem.go:36] "Initialized new in-memory state store" May 13 00:44:08.701328 kubelet[1444]: I0513 00:44:08.701086 1444 kubelet.go:408] "Attempting to sync node with API server" May 13 00:44:08.701328 kubelet[1444]: I0513 00:44:08.701328 1444 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:44:08.701545 kubelet[1444]: I0513 00:44:08.701361 1444 kubelet.go:314] "Adding apiserver pod source" May 13 00:44:08.701545 kubelet[1444]: I0513 00:44:08.701374 1444 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:44:08.715304 kubelet[1444]: E0513 00:44:08.715255 1444 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:08.715304 kubelet[1444]: E0513 00:44:08.715305 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:08.721134 kubelet[1444]: I0513 00:44:08.721109 1444 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:44:08.723685 kubelet[1444]: W0513 00:44:08.723662 1444 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 13 00:44:08.723743 kubelet[1444]: E0513 00:44:08.723710 1444 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 13 00:44:08.723915 kubelet[1444]: I0513 00:44:08.723898 1444 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:44:08.724494 kubelet[1444]: W0513 00:44:08.724477 1444 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:44:08.725302 kubelet[1444]: I0513 00:44:08.725281 1444 server.go:1269] "Started kubelet" May 13 00:44:08.725373 kubelet[1444]: I0513 00:44:08.725337 1444 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:44:08.726192 kubelet[1444]: I0513 00:44:08.726170 1444 server.go:460] "Adding debug handlers to kubelet server" May 13 00:44:08.726941 kubelet[1444]: I0513 00:44:08.726890 1444 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:44:08.727119 kubelet[1444]: I0513 00:44:08.727092 1444 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:44:08.733000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.733000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:44:08.733000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bdd920 a1=c000059218 a2=c000bdd8f0 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:08.733000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:44:08.733000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:08.733000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:44:08.733000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000b2660 a1=c000059230 a2=c000bdd9b0 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:08.733000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:44:08.734028 kubelet[1444]: I0513 00:44:08.733769 1444 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:44:08.734028 kubelet[1444]: I0513 00:44:08.733803 1444 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:44:08.734028 kubelet[1444]: I0513 00:44:08.733854 1444 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:44:08.739178 kubelet[1444]: I0513 00:44:08.739135 1444 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:44:08.741348 kubelet[1444]: E0513 00:44:08.741150 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:08.741348 kubelet[1444]: I0513 00:44:08.741213 1444 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:44:08.741348 kubelet[1444]: W0513 00:44:08.741309 1444 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.85" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 13 00:44:08.741348 kubelet[1444]: E0513 00:44:08.741333 1444 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.85\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 13 00:44:08.741348 kubelet[1444]: I0513 00:44:08.741349 1444 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:44:08.741525 kubelet[1444]: I0513 00:44:08.741389 1444 reconciler.go:26] "Reconciler: start to sync state" May 13 00:44:08.741864 kubelet[1444]: I0513 00:44:08.741825 1444 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:44:08.742699 kubelet[1444]: E0513 00:44:08.742683 1444 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:44:08.745087 kubelet[1444]: I0513 00:44:08.745074 1444 factory.go:221] Registration of the containerd container factory successfully May 13 00:44:08.745177 kubelet[1444]: I0513 00:44:08.745165 1444 factory.go:221] Registration of the systemd container factory successfully May 13 00:44:08.747217 kubelet[1444]: E0513 00:44:08.747188 1444 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.85\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 13 00:44:08.748592 kubelet[1444]: E0513 00:44:08.747347 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.85.183eef826166fcd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.85,UID:10.0.0.85,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.85,},FirstTimestamp:2025-05-13 00:44:08.725257424 +0000 UTC m=+0.331753228,LastTimestamp:2025-05-13 00:44:08.725257424 +0000 UTC m=+0.331753228,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.85,}" May 13 00:44:08.748592 kubelet[1444]: W0513 00:44:08.748568 1444 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 13 00:44:08.748592 kubelet[1444]: E0513 00:44:08.748590 1444 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 13 00:44:08.750607 kubelet[1444]: E0513 00:44:08.750530 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.85.183eef826270aa8b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.85,UID:10.0.0.85,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.85,},FirstTimestamp:2025-05-13 00:44:08.742668939 +0000 UTC m=+0.349164743,LastTimestamp:2025-05-13 00:44:08.742668939 +0000 UTC m=+0.349164743,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.85,}" May 13 00:44:08.753249 kubelet[1444]: I0513 00:44:08.752348 1444 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:44:08.753249 kubelet[1444]: I0513 00:44:08.752364 1444 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:44:08.753249 kubelet[1444]: I0513 00:44:08.752383 1444 state_mem.go:36] "Initialized new in-memory state store" May 13 00:44:08.753363 kubelet[1444]: E0513 00:44:08.753203 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.85.183eef8262fabd49 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.85,UID:10.0.0.85,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.0.0.85 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.0.0.85,},FirstTimestamp:2025-05-13 00:44:08.751717705 +0000 UTC m=+0.358213509,LastTimestamp:2025-05-13 00:44:08.751717705 +0000 UTC m=+0.358213509,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.85,}" May 13 00:44:08.755821 kubelet[1444]: E0513 00:44:08.755767 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.85.183eef8262faf49e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.85,UID:10.0.0.85,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.85 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.85,},FirstTimestamp:2025-05-13 00:44:08.75173187 +0000 UTC m=+0.358227674,LastTimestamp:2025-05-13 00:44:08.75173187 +0000 UTC m=+0.358227674,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.85,}" May 13 00:44:08.757419 kubelet[1444]: E0513 00:44:08.757363 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.85.183eef8262fb0990 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.85,UID:10.0.0.85,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.0.0.85 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.0.0.85,},FirstTimestamp:2025-05-13 00:44:08.751737232 +0000 UTC m=+0.358233036,LastTimestamp:2025-05-13 00:44:08.751737232 +0000 UTC m=+0.358233036,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.85,}" May 13 00:44:08.841743 kubelet[1444]: E0513 00:44:08.841707 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:08.942083 kubelet[1444]: E0513 00:44:08.941996 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:08.948982 kubelet[1444]: E0513 00:44:08.948949 1444 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.85\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" May 13 00:44:09.042178 kubelet[1444]: E0513 00:44:09.042140 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.143288 kubelet[1444]: E0513 00:44:09.143249 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.216481 kubelet[1444]: I0513 00:44:09.216399 1444 policy_none.go:49] "None policy: Start" May 13 00:44:09.217373 kubelet[1444]: I0513 00:44:09.217358 1444 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:44:09.217438 kubelet[1444]: I0513 00:44:09.217376 1444 state_mem.go:35] "Initializing new in-memory state store" May 13 00:44:09.222701 systemd[1]: Created slice kubepods.slice. May 13 00:44:09.226354 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:44:09.228468 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:44:09.231000 audit[1461]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.231000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff746889c0 a2=0 a3=7fff746889ac items=0 ppid=1444 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:44:09.232000 audit[1464]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.232000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc7ffe30f0 a2=0 a3=7ffc7ffe30dc items=0 ppid=1444 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:44:09.238173 kubelet[1444]: I0513 00:44:09.238137 1444 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:44:09.237000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:09.237000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:44:09.237000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000599fb0 a1=c00096d9b0 a2=c000599f80 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.237000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:44:09.238483 kubelet[1444]: I0513 00:44:09.238196 1444 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:44:09.238483 kubelet[1444]: I0513 00:44:09.238310 1444 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:44:09.238483 kubelet[1444]: I0513 00:44:09.238320 1444 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:44:09.239011 kubelet[1444]: I0513 00:44:09.238539 1444 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:44:09.239964 kubelet[1444]: E0513 00:44:09.239937 1444 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.85\" not found" May 13 00:44:09.234000 audit[1466]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.234000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff524c59a0 a2=0 a3=7fff524c598c items=0 ppid=1444 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:44:09.253000 audit[1471]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.253000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdffe03960 a2=0 a3=7ffdffe0394c items=0 ppid=1444 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:44:09.288000 audit[1476]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.288000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffeaf0beb0 a2=0 a3=7fffeaf0be9c items=0 ppid=1444 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:44:09.289460 kubelet[1444]: I0513 00:44:09.289412 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:44:09.289000 audit[1477]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:09.289000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff43317310 a2=0 a3=7fff433172fc items=0 ppid=1444 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:44:09.289000 audit[1478]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.289000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc16e4a660 a2=0 a3=7ffc16e4a64c items=0 ppid=1444 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:44:09.290628 kubelet[1444]: I0513 00:44:09.290606 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:44:09.290698 kubelet[1444]: I0513 00:44:09.290643 1444 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:44:09.290698 kubelet[1444]: I0513 00:44:09.290673 1444 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:44:09.290824 kubelet[1444]: E0513 00:44:09.290803 1444 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 13 00:44:09.290000 audit[1479]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.290000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd9af08790 a2=0 a3=7ffd9af0877c items=0 ppid=1444 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:44:09.291000 audit[1480]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:09.291000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0abb66a0 a2=0 a3=7ffd0abb668c items=0 ppid=1444 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:44:09.291000 audit[1481]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:09.291000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5595b0a0 a2=0 a3=7fff5595b08c items=0 ppid=1444 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:44:09.292000 audit[1482]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:09.292000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc47f32b60 a2=0 a3=7ffc47f32b4c items=0 ppid=1444 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:44:09.293000 audit[1483]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:09.293000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda98defc0 a2=0 a3=7ffda98defac items=0 ppid=1444 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:09.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:44:09.339968 kubelet[1444]: I0513 00:44:09.339914 1444 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.85" May 13 00:44:09.414917 kubelet[1444]: I0513 00:44:09.414879 1444 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.85" May 13 00:44:09.414917 kubelet[1444]: E0513 00:44:09.414909 1444 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.85\": node \"10.0.0.85\" not found" May 13 00:44:09.427178 kubelet[1444]: E0513 00:44:09.427144 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.429512 sudo[1339]: pam_unix(sudo:session): session closed for user root May 13 00:44:09.428000 audit[1339]: USER_END pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:09.428000 audit[1339]: CRED_DISP pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:09.430831 sshd[1336]: pam_unix(sshd:session): session closed for user core May 13 00:44:09.430000 audit[1336]: USER_END pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.430000 audit[1336]: CRED_DISP pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:09.433210 systemd[1]: sshd@6-10.0.0.85:22-10.0.0.1:50958.service: Deactivated successfully. May 13 00:44:09.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.85:22-10.0.0.1:50958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:09.434012 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:44:09.434546 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. May 13 00:44:09.435154 systemd-logind[1190]: Removed session 7. May 13 00:44:09.527522 kubelet[1444]: E0513 00:44:09.527423 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.628278 kubelet[1444]: E0513 00:44:09.628220 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.674018 kubelet[1444]: I0513 00:44:09.673963 1444 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 13 00:44:09.674193 kubelet[1444]: W0513 00:44:09.674149 1444 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:44:09.716047 kubelet[1444]: E0513 00:44:09.715993 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:09.728625 kubelet[1444]: E0513 00:44:09.728587 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.829657 kubelet[1444]: E0513 00:44:09.829538 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:09.930728 kubelet[1444]: E0513 00:44:09.930682 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:10.031595 kubelet[1444]: E0513 00:44:10.031543 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:10.131941 kubelet[1444]: E0513 00:44:10.131769 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:10.232435 kubelet[1444]: E0513 00:44:10.232376 1444 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.85\" not found" May 13 00:44:10.332916 kubelet[1444]: I0513 00:44:10.332884 1444 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 13 00:44:10.333200 env[1197]: time="2025-05-13T00:44:10.333140738Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:44:10.333451 kubelet[1444]: I0513 00:44:10.333299 1444 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 13 00:44:10.717139 kubelet[1444]: I0513 00:44:10.717072 1444 apiserver.go:52] "Watching apiserver" May 13 00:44:10.717482 kubelet[1444]: E0513 00:44:10.717092 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:10.721388 kubelet[1444]: E0513 00:44:10.721354 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:10.726406 systemd[1]: Created slice kubepods-besteffort-pod2114b410_e5e5_4481_88b3_19c18a2ebdea.slice. May 13 00:44:10.733027 systemd[1]: Created slice kubepods-besteffort-pod96d6b468_3efb_4d83_b60d_992574019f79.slice. May 13 00:44:10.742566 kubelet[1444]: I0513 00:44:10.742514 1444 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:44:10.751537 kubelet[1444]: I0513 00:44:10.751500 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2114b410-e5e5-4481-88b3-19c18a2ebdea-xtables-lock\") pod \"kube-proxy-5nntd\" (UID: \"2114b410-e5e5-4481-88b3-19c18a2ebdea\") " pod="kube-system/kube-proxy-5nntd" May 13 00:44:10.751603 kubelet[1444]: I0513 00:44:10.751570 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2114b410-e5e5-4481-88b3-19c18a2ebdea-lib-modules\") pod \"kube-proxy-5nntd\" (UID: \"2114b410-e5e5-4481-88b3-19c18a2ebdea\") " pod="kube-system/kube-proxy-5nntd" May 13 00:44:10.751603 kubelet[1444]: I0513 00:44:10.751594 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-policysync\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751669 kubelet[1444]: I0513 00:44:10.751606 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-var-lib-calico\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751669 kubelet[1444]: I0513 00:44:10.751635 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c-socket-dir\") pod \"csi-node-driver-wvf9j\" (UID: \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\") " pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:10.751669 kubelet[1444]: I0513 00:44:10.751650 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c-registration-dir\") pod \"csi-node-driver-wvf9j\" (UID: \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\") " pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:10.751669 kubelet[1444]: I0513 00:44:10.751663 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c-kubelet-dir\") pod \"csi-node-driver-wvf9j\" (UID: \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\") " pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:10.751810 kubelet[1444]: I0513 00:44:10.751676 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-lib-modules\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751810 kubelet[1444]: I0513 00:44:10.751689 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/96d6b468-3efb-4d83-b60d-992574019f79-node-certs\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751810 kubelet[1444]: I0513 00:44:10.751702 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-flexvol-driver-host\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751810 kubelet[1444]: I0513 00:44:10.751716 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c-varrun\") pod \"csi-node-driver-wvf9j\" (UID: \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\") " pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:10.751810 kubelet[1444]: I0513 00:44:10.751730 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-xtables-lock\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751928 kubelet[1444]: I0513 00:44:10.751742 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-cni-net-dir\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751928 kubelet[1444]: I0513 00:44:10.751754 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-cni-log-dir\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.751928 kubelet[1444]: I0513 00:44:10.751767 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2114b410-e5e5-4481-88b3-19c18a2ebdea-kube-proxy\") pod \"kube-proxy-5nntd\" (UID: \"2114b410-e5e5-4481-88b3-19c18a2ebdea\") " pod="kube-system/kube-proxy-5nntd" May 13 00:44:10.751928 kubelet[1444]: I0513 00:44:10.751779 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9th5c\" (UniqueName: \"kubernetes.io/projected/5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c-kube-api-access-9th5c\") pod \"csi-node-driver-wvf9j\" (UID: \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\") " pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:10.751928 kubelet[1444]: I0513 00:44:10.751792 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g2v7d\" (UniqueName: \"kubernetes.io/projected/2114b410-e5e5-4481-88b3-19c18a2ebdea-kube-api-access-g2v7d\") pod \"kube-proxy-5nntd\" (UID: \"2114b410-e5e5-4481-88b3-19c18a2ebdea\") " pod="kube-system/kube-proxy-5nntd" May 13 00:44:10.752046 kubelet[1444]: I0513 00:44:10.751805 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/96d6b468-3efb-4d83-b60d-992574019f79-tigera-ca-bundle\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.752046 kubelet[1444]: I0513 00:44:10.751826 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-var-run-calico\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.752046 kubelet[1444]: I0513 00:44:10.752009 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/96d6b468-3efb-4d83-b60d-992574019f79-cni-bin-dir\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.752046 kubelet[1444]: I0513 00:44:10.752023 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zndzp\" (UniqueName: \"kubernetes.io/projected/96d6b468-3efb-4d83-b60d-992574019f79-kube-api-access-zndzp\") pod \"calico-node-6vkn8\" (UID: \"96d6b468-3efb-4d83-b60d-992574019f79\") " pod="calico-system/calico-node-6vkn8" May 13 00:44:10.853452 kubelet[1444]: I0513 00:44:10.853402 1444 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:44:10.858785 kubelet[1444]: E0513 00:44:10.857729 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.858785 kubelet[1444]: W0513 00:44:10.857759 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.858785 kubelet[1444]: E0513 00:44:10.857778 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.954073 kubelet[1444]: E0513 00:44:10.954047 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.954073 kubelet[1444]: W0513 00:44:10.954065 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.954073 kubelet[1444]: E0513 00:44:10.954082 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.954346 kubelet[1444]: E0513 00:44:10.954333 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.954346 kubelet[1444]: W0513 00:44:10.954342 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.954410 kubelet[1444]: E0513 00:44:10.954349 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.954495 kubelet[1444]: E0513 00:44:10.954487 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.954495 kubelet[1444]: W0513 00:44:10.954494 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.954571 kubelet[1444]: E0513 00:44:10.954500 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.998514 kubelet[1444]: E0513 00:44:10.997213 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.998514 kubelet[1444]: W0513 00:44:10.997232 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.998514 kubelet[1444]: E0513 00:44:10.997252 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.998514 kubelet[1444]: E0513 00:44:10.998175 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.998514 kubelet[1444]: W0513 00:44:10.998184 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.998514 kubelet[1444]: E0513 00:44:10.998194 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:10.999074 kubelet[1444]: E0513 00:44:10.999054 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:44:10.999074 kubelet[1444]: W0513 00:44:10.999072 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:44:10.999138 kubelet[1444]: E0513 00:44:10.999091 1444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:44:11.032336 kubelet[1444]: E0513 00:44:11.032284 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:11.032940 env[1197]: time="2025-05-13T00:44:11.032896447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5nntd,Uid:2114b410-e5e5-4481-88b3-19c18a2ebdea,Namespace:kube-system,Attempt:0,}" May 13 00:44:11.035130 kubelet[1444]: E0513 00:44:11.035090 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:11.035655 env[1197]: time="2025-05-13T00:44:11.035607634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vkn8,Uid:96d6b468-3efb-4d83-b60d-992574019f79,Namespace:calico-system,Attempt:0,}" May 13 00:44:11.717356 kubelet[1444]: E0513 00:44:11.717313 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:12.291899 kubelet[1444]: E0513 00:44:12.291837 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:12.718173 kubelet[1444]: E0513 00:44:12.718074 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:12.885686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2932420739.mount: Deactivated successfully. May 13 00:44:12.896389 env[1197]: time="2025-05-13T00:44:12.896337803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.898967 env[1197]: time="2025-05-13T00:44:12.898924210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.899903 env[1197]: time="2025-05-13T00:44:12.899871257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.902238 env[1197]: time="2025-05-13T00:44:12.902189374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.903352 env[1197]: time="2025-05-13T00:44:12.903314676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.904606 env[1197]: time="2025-05-13T00:44:12.904584143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.906061 env[1197]: time="2025-05-13T00:44:12.906024993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.907766 env[1197]: time="2025-05-13T00:44:12.907737669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.925665283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.925713349Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.925726236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.925875179Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e944fd86195b6e1703f61da5b8a6b25be40d8a9e3c1f025fcbe3b80fe67be7d2 pid=1513 runtime=io.containerd.runc.v2 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.926241623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.926267349Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.926276337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:12.926536 env[1197]: time="2025-05-13T00:44:12.926399725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac pid=1511 runtime=io.containerd.runc.v2 May 13 00:44:12.937924 systemd[1]: Started cri-containerd-e944fd86195b6e1703f61da5b8a6b25be40d8a9e3c1f025fcbe3b80fe67be7d2.scope. May 13 00:44:12.942951 systemd[1]: Started cri-containerd-139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac.scope. May 13 00:44:12.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.951773 kernel: kauditd_printk_skb: 243 callbacks suppressed May 13 00:44:12.951832 kernel: audit: type=1400 audit(1747097052.950:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961522 kernel: audit: type=1400 audit(1747097052.950:408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961599 kernel: audit: type=1400 audit(1747097052.950:409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.968102 kernel: audit: type=1400 audit(1747097052.950:410): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.968167 kernel: audit: type=1400 audit(1747097052.950:411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.968192 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:44:12.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.972486 kernel: audit: type=1400 audit(1747097052.950:412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.972560 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 00:44:12.972588 kernel: audit: backlog limit exceeded May 13 00:44:12.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.980118 kernel: audit: type=1400 audit(1747097052.950:413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit: BPF prog-id=58 op=LOAD May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1513 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466643836313935623665313730336636316461356238613662 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1513 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466643836313935623665313730336636316461356238613662 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.954000 audit: BPF prog-id=59 op=LOAD May 13 00:44:12.954000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019f5b0 items=0 ppid=1513 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466643836313935623665313730336636316461356238613662 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit: BPF prog-id=60 op=LOAD May 13 00:44:12.961000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.961000 audit: BPF prog-id=61 op=LOAD May 13 00:44:12.961000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019f5f8 items=0 ppid=1513 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466643836313935623665313730336636316461356238613662 May 13 00:44:12.964000 audit: BPF prog-id=61 op=UNLOAD May 13 00:44:12.964000 audit: BPF prog-id=59 op=UNLOAD May 13 00:44:12.964000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { perfmon } for pid=1534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: AVC avc: denied { bpf } for pid=1534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019fa08 items=0 ppid=1513 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.964000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1511 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393133336463393238356366613630656364336533373435653833 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466643836313935623665313730336636316461356238613662 May 13 00:44:12.979000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1511 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393133336463393238356366613630656364336533373435653833 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit: BPF prog-id=63 op=LOAD May 13 00:44:12.979000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002290c0 items=0 ppid=1511 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393133336463393238356366613630656364336533373435653833 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit: BPF prog-id=64 op=LOAD May 13 00:44:12.979000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229108 items=0 ppid=1511 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393133336463393238356366613630656364336533373435653833 May 13 00:44:12.979000 audit: BPF prog-id=64 op=UNLOAD May 13 00:44:12.979000 audit: BPF prog-id=63 op=UNLOAD May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:12.979000 audit: BPF prog-id=65 op=LOAD May 13 00:44:12.979000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000229518 items=0 ppid=1511 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:12.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393133336463393238356366613630656364336533373435653833 May 13 00:44:12.993510 env[1197]: time="2025-05-13T00:44:12.993474967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5nntd,Uid:2114b410-e5e5-4481-88b3-19c18a2ebdea,Namespace:kube-system,Attempt:0,} returns sandbox id \"e944fd86195b6e1703f61da5b8a6b25be40d8a9e3c1f025fcbe3b80fe67be7d2\"" May 13 00:44:12.993672 env[1197]: time="2025-05-13T00:44:12.993614255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vkn8,Uid:96d6b468-3efb-4d83-b60d-992574019f79,Namespace:calico-system,Attempt:0,} returns sandbox id \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\"" May 13 00:44:12.994637 kubelet[1444]: E0513 00:44:12.994612 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:12.994721 kubelet[1444]: E0513 00:44:12.994661 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:12.995767 env[1197]: time="2025-05-13T00:44:12.995747961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:44:13.718640 kubelet[1444]: E0513 00:44:13.718604 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:14.291250 kubelet[1444]: E0513 00:44:14.291197 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:14.718883 kubelet[1444]: E0513 00:44:14.718728 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:14.955771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4221195398.mount: Deactivated successfully. May 13 00:44:15.384172 env[1197]: time="2025-05-13T00:44:15.384105655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:15.385822 env[1197]: time="2025-05-13T00:44:15.385774819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:15.387115 env[1197]: time="2025-05-13T00:44:15.387087867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:15.388419 env[1197]: time="2025-05-13T00:44:15.388380537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:15.388724 env[1197]: time="2025-05-13T00:44:15.388694834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:44:15.389980 env[1197]: time="2025-05-13T00:44:15.389954255Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 00:44:15.390826 env[1197]: time="2025-05-13T00:44:15.390791603Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:44:15.402879 env[1197]: time="2025-05-13T00:44:15.402845301Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b\"" May 13 00:44:15.403337 env[1197]: time="2025-05-13T00:44:15.403303893Z" level=info msg="StartContainer for \"ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b\"" May 13 00:44:15.415616 systemd[1]: Started cri-containerd-ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b.scope. May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5d4c41b5f8 items=0 ppid=1511 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:15.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363138396166383737313634663334393062373737643766633463 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit: BPF prog-id=66 op=LOAD May 13 00:44:15.425000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00023bf88 items=0 ppid=1511 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:15.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363138396166383737313634663334393062373737643766633463 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit: BPF prog-id=67 op=LOAD May 13 00:44:15.425000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00023bfd8 items=0 ppid=1511 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:15.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363138396166383737313634663334393062373737643766633463 May 13 00:44:15.425000 audit: BPF prog-id=67 op=UNLOAD May 13 00:44:15.425000 audit: BPF prog-id=66 op=UNLOAD May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:15.425000 audit: BPF prog-id=68 op=LOAD May 13 00:44:15.425000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388068 items=0 ppid=1511 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:15.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363138396166383737313634663334393062373737643766633463 May 13 00:44:15.437783 env[1197]: time="2025-05-13T00:44:15.437719076Z" level=info msg="StartContainer for \"ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b\" returns successfully" May 13 00:44:15.444088 systemd[1]: cri-containerd-ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b.scope: Deactivated successfully. May 13 00:44:15.449000 audit: BPF prog-id=68 op=UNLOAD May 13 00:44:15.540827 env[1197]: time="2025-05-13T00:44:15.540767325Z" level=info msg="shim disconnected" id=ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b May 13 00:44:15.540827 env[1197]: time="2025-05-13T00:44:15.540806268Z" level=warning msg="cleaning up after shim disconnected" id=ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b namespace=k8s.io May 13 00:44:15.540827 env[1197]: time="2025-05-13T00:44:15.540814957Z" level=info msg="cleaning up dead shim" May 13 00:44:15.546908 env[1197]: time="2025-05-13T00:44:15.546881232Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:44:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1628 runtime=io.containerd.runc.v2\n" May 13 00:44:15.719631 kubelet[1444]: E0513 00:44:15.719526 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:15.914315 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac6189af877164f3490b777d7fc4c97d006caa19cfd9fb44ae0b010253bb556b-rootfs.mount: Deactivated successfully. May 13 00:44:16.291132 kubelet[1444]: E0513 00:44:16.291059 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:16.303469 kubelet[1444]: E0513 00:44:16.303447 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:16.720311 kubelet[1444]: E0513 00:44:16.720187 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:16.750938 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3808474384.mount: Deactivated successfully. May 13 00:44:17.721052 kubelet[1444]: E0513 00:44:17.721014 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:17.859038 env[1197]: time="2025-05-13T00:44:17.857185245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:17.864904 env[1197]: time="2025-05-13T00:44:17.864872979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:17.872083 env[1197]: time="2025-05-13T00:44:17.872052071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:17.874527 env[1197]: time="2025-05-13T00:44:17.874497146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:17.874940 env[1197]: time="2025-05-13T00:44:17.874904559Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 00:44:17.876117 env[1197]: time="2025-05-13T00:44:17.876078799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:44:17.877093 env[1197]: time="2025-05-13T00:44:17.877065294Z" level=info msg="CreateContainer within sandbox \"e944fd86195b6e1703f61da5b8a6b25be40d8a9e3c1f025fcbe3b80fe67be7d2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:44:17.896527 env[1197]: time="2025-05-13T00:44:17.896479265Z" level=info msg="CreateContainer within sandbox \"e944fd86195b6e1703f61da5b8a6b25be40d8a9e3c1f025fcbe3b80fe67be7d2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5afd9732650150b7dbb3d4c8cb3ddf371fe878c3976264fbf7108bf4678215bf\"" May 13 00:44:17.897110 env[1197]: time="2025-05-13T00:44:17.897073751Z" level=info msg="StartContainer for \"5afd9732650150b7dbb3d4c8cb3ddf371fe878c3976264fbf7108bf4678215bf\"" May 13 00:44:17.913365 systemd[1]: Started cri-containerd-5afd9732650150b7dbb3d4c8cb3ddf371fe878c3976264fbf7108bf4678215bf.scope. May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9111f7fc38 items=0 ppid=1513 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:17.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561666439373332363530313530623764626233643463386362336464 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit: BPF prog-id=69 op=LOAD May 13 00:44:17.922000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000306cf8 items=0 ppid=1513 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:17.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561666439373332363530313530623764626233643463386362336464 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit: BPF prog-id=70 op=LOAD May 13 00:44:17.922000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000306d48 items=0 ppid=1513 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:17.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561666439373332363530313530623764626233643463386362336464 May 13 00:44:17.922000 audit: BPF prog-id=70 op=UNLOAD May 13 00:44:17.922000 audit: BPF prog-id=69 op=UNLOAD May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:17.922000 audit: BPF prog-id=71 op=LOAD May 13 00:44:17.922000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000306dd8 items=0 ppid=1513 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:17.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561666439373332363530313530623764626233643463386362336464 May 13 00:44:17.936585 env[1197]: time="2025-05-13T00:44:17.935690516Z" level=info msg="StartContainer for \"5afd9732650150b7dbb3d4c8cb3ddf371fe878c3976264fbf7108bf4678215bf\" returns successfully" May 13 00:44:18.034587 kernel: kauditd_printk_skb: 193 callbacks suppressed May 13 00:44:18.034714 kernel: audit: type=1325 audit(1747097058.031:456): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.031000 audit[1716]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.031000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5fe11910 a2=0 a3=7ffc5fe118fc items=0 ppid=1665 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.041078 kernel: audit: type=1300 audit(1747097058.031:456): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5fe11910 a2=0 a3=7ffc5fe118fc items=0 ppid=1665 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.041198 kernel: audit: type=1327 audit(1747097058.031:456): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:44:18.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:44:18.031000 audit[1715]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.046628 kernel: audit: type=1325 audit(1747097058.031:457): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.046676 kernel: audit: type=1300 audit(1747097058.031:457): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1d22eb40 a2=0 a3=7ffd1d22eb2c items=0 ppid=1665 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.031000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1d22eb40 a2=0 a3=7ffd1d22eb2c items=0 ppid=1665 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:44:18.054463 kernel: audit: type=1327 audit(1747097058.031:457): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:44:18.054519 kernel: audit: type=1325 audit(1747097058.032:458): table=nat:16 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.032000 audit[1717]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.032000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda9a6fa00 a2=0 a3=7ffda9a6f9ec items=0 ppid=1665 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.061604 kernel: audit: type=1300 audit(1747097058.032:458): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda9a6fa00 a2=0 a3=7ffda9a6f9ec items=0 ppid=1665 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.061760 kernel: audit: type=1327 audit(1747097058.032:458): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:44:18.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:44:18.063702 kernel: audit: type=1325 audit(1747097058.033:459): table=filter:17 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.033000 audit[1718]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.033000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff12d88950 a2=0 a3=7fff12d8893c items=0 ppid=1665 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:44:18.036000 audit[1719]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.036000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc820dbd00 a2=0 a3=7ffc820dbcec items=0 ppid=1665 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:44:18.037000 audit[1720]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.037000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda6acf6e0 a2=0 a3=7ffda6acf6cc items=0 ppid=1665 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:44:18.133000 audit[1721]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.133000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeb5d73200 a2=0 a3=7ffeb5d731ec items=0 ppid=1665 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:44:18.136000 audit[1723]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.136000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffc588cf70 a2=0 a3=7fffc588cf5c items=0 ppid=1665 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:44:18.139000 audit[1726]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.139000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd9c00190 a2=0 a3=7ffcd9c0017c items=0 ppid=1665 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:44:18.140000 audit[1727]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.140000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9819d340 a2=0 a3=7fff9819d32c items=0 ppid=1665 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:44:18.142000 audit[1729]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.142000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd06eb1700 a2=0 a3=7ffd06eb16ec items=0 ppid=1665 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:44:18.143000 audit[1730]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.143000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc19e9bc0 a2=0 a3=7ffdc19e9bac items=0 ppid=1665 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:44:18.145000 audit[1732]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.145000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc086bac60 a2=0 a3=7ffc086bac4c items=0 ppid=1665 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:44:18.148000 audit[1735]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.148000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd842cb9b0 a2=0 a3=7ffd842cb99c items=0 ppid=1665 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:44:18.148000 audit[1736]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.148000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4ffbe3b0 a2=0 a3=7fff4ffbe39c items=0 ppid=1665 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:44:18.150000 audit[1738]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.150000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefd73f840 a2=0 a3=7ffefd73f82c items=0 ppid=1665 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:44:18.151000 audit[1739]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.151000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd72d03b0 a2=0 a3=7ffcd72d039c items=0 ppid=1665 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:44:18.155000 audit[1742]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.155000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec9c8a0c0 a2=0 a3=7ffec9c8a0ac items=0 ppid=1665 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:44:18.158000 audit[1745]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.158000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc80ffdd80 a2=0 a3=7ffc80ffdd6c items=0 ppid=1665 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:44:18.161000 audit[1748]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.161000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea39cb4d0 a2=0 a3=7ffea39cb4bc items=0 ppid=1665 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:44:18.162000 audit[1749]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.162000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff4cc56fc0 a2=0 a3=7fff4cc56fac items=0 ppid=1665 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:44:18.163000 audit[1751]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.163000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc63014900 a2=0 a3=7ffc630148ec items=0 ppid=1665 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:44:18.186000 audit[1755]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.186000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd35fc9360 a2=0 a3=7ffd35fc934c items=0 ppid=1665 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:44:18.187000 audit[1756]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.187000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc4446e20 a2=0 a3=7ffcc4446e0c items=0 ppid=1665 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:44:18.189000 audit[1758]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:18.189000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffdc3678a0 a2=0 a3=7fffdc36788c items=0 ppid=1665 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:44:18.209000 audit[1764]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.209000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc08fb9da0 a2=0 a3=7ffc08fb9d8c items=0 ppid=1665 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.224000 audit[1764]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.224000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc08fb9da0 a2=0 a3=7ffc08fb9d8c items=0 ppid=1665 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.226000 audit[1771]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.226000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7bd53980 a2=0 a3=7ffd7bd5396c items=0 ppid=1665 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:44:18.228000 audit[1773]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.228000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc51e389c0 a2=0 a3=7ffc51e389ac items=0 ppid=1665 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:44:18.230000 audit[1776]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.230000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda89543c0 a2=0 a3=7ffda89543ac items=0 ppid=1665 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:44:18.231000 audit[1777]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.231000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9a172f0 a2=0 a3=7ffce9a172dc items=0 ppid=1665 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:44:18.233000 audit[1779]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.233000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd21c80620 a2=0 a3=7ffd21c8060c items=0 ppid=1665 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:44:18.234000 audit[1780]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.234000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f6112d0 a2=0 a3=7ffd3f6112bc items=0 ppid=1665 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:44:18.236000 audit[1782]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.236000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffebac063c0 a2=0 a3=7ffebac063ac items=0 ppid=1665 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:44:18.238000 audit[1785]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.238000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd29f9fde0 a2=0 a3=7ffd29f9fdcc items=0 ppid=1665 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:44:18.239000 audit[1786]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.239000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcebb1bf80 a2=0 a3=7ffcebb1bf6c items=0 ppid=1665 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:44:18.241000 audit[1788]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.241000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc74461a0 a2=0 a3=7ffdc744618c items=0 ppid=1665 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:44:18.242000 audit[1789]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.242000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8a364560 a2=0 a3=7ffe8a36454c items=0 ppid=1665 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:44:18.244000 audit[1791]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.244000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6d9cb490 a2=0 a3=7ffd6d9cb47c items=0 ppid=1665 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:44:18.247000 audit[1794]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.247000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4ec32e80 a2=0 a3=7ffc4ec32e6c items=0 ppid=1665 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:44:18.249000 audit[1797]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.249000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc42173a50 a2=0 a3=7ffc42173a3c items=0 ppid=1665 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:44:18.250000 audit[1798]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.250000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdad226ce0 a2=0 a3=7ffdad226ccc items=0 ppid=1665 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:44:18.252000 audit[1800]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.252000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffca0c97210 a2=0 a3=7ffca0c971fc items=0 ppid=1665 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:44:18.255000 audit[1803]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.255000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6f5d2270 a2=0 a3=7fff6f5d225c items=0 ppid=1665 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:44:18.256000 audit[1804]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.256000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe63eeea30 a2=0 a3=7ffe63eeea1c items=0 ppid=1665 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:44:18.258000 audit[1806]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.258000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe4f6a5f70 a2=0 a3=7ffe4f6a5f5c items=0 ppid=1665 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:44:18.259000 audit[1807]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.259000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffae348ec0 a2=0 a3=7fffae348eac items=0 ppid=1665 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:44:18.261000 audit[1809]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.261000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd42194c0 a2=0 a3=7fffd42194ac items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:44:18.263000 audit[1812]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:44:18.263000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe15fcfbc0 a2=0 a3=7ffe15fcfbac items=0 ppid=1665 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:44:18.265000 audit[1814]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:44:18.265000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdd3708550 a2=0 a3=7ffdd370853c items=0 ppid=1665 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.265000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.266000 audit[1814]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:44:18.266000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd3708550 a2=0 a3=7ffdd370853c items=0 ppid=1665 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.266000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.274000 audit[1816]: NETFILTER_CFG table=filter:65 family=2 entries=17 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.274000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffde6e84510 a2=0 a3=7ffde6e844fc items=0 ppid=1665 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.282000 audit[1816]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:18.282000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffde6e84510 a2=0 a3=7ffde6e844fc items=0 ppid=1665 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:18.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:18.291241 kubelet[1444]: E0513 00:44:18.291137 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:18.307485 kubelet[1444]: E0513 00:44:18.307455 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:18.314350 kubelet[1444]: I0513 00:44:18.314294 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-5nntd" podStartSLOduration=4.433854234 podStartE2EDuration="9.314277682s" podCreationTimestamp="2025-05-13 00:44:09 +0000 UTC" firstStartedPulling="2025-05-13 00:44:12.995455458 +0000 UTC m=+4.601951262" lastFinishedPulling="2025-05-13 00:44:17.875878905 +0000 UTC m=+9.482374710" observedRunningTime="2025-05-13 00:44:18.314231145 +0000 UTC m=+9.920726949" watchObservedRunningTime="2025-05-13 00:44:18.314277682 +0000 UTC m=+9.920773486" May 13 00:44:18.722118 kubelet[1444]: E0513 00:44:18.721976 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:19.308959 kubelet[1444]: E0513 00:44:19.308920 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:19.723038 kubelet[1444]: E0513 00:44:19.722913 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:20.291848 kubelet[1444]: E0513 00:44:20.291805 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:20.723892 kubelet[1444]: E0513 00:44:20.723772 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:21.724179 kubelet[1444]: E0513 00:44:21.724146 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:22.291355 kubelet[1444]: E0513 00:44:22.291288 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:22.725278 kubelet[1444]: E0513 00:44:22.725169 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:23.330914 env[1197]: time="2025-05-13T00:44:23.330839851Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:23.333783 env[1197]: time="2025-05-13T00:44:23.333730499Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:23.335628 env[1197]: time="2025-05-13T00:44:23.335591632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:23.337641 env[1197]: time="2025-05-13T00:44:23.337607341Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:23.338093 env[1197]: time="2025-05-13T00:44:23.338049315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:44:23.340065 env[1197]: time="2025-05-13T00:44:23.339999364Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:44:23.357387 env[1197]: time="2025-05-13T00:44:23.357316484Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8\"" May 13 00:44:23.357924 env[1197]: time="2025-05-13T00:44:23.357894824Z" level=info msg="StartContainer for \"4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8\"" May 13 00:44:23.373657 systemd[1]: run-containerd-runc-k8s.io-4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8-runc.vON09p.mount: Deactivated successfully. May 13 00:44:23.376286 systemd[1]: Started cri-containerd-4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8.scope. May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.390117 kernel: kauditd_printk_skb: 149 callbacks suppressed May 13 00:44:23.390169 kernel: audit: type=1400 audit(1747097063.388:509): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f84a45ec5f8 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:23.397576 kernel: audit: type=1300 audit(1747097063.388:509): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f84a45ec5f8 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:23.397618 kernel: audit: type=1327 audit(1747097063.388:509): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653934353630383065316630333436306463663034376362323662 May 13 00:44:23.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653934353630383065316630333436306463663034376362323662 May 13 00:44:23.401612 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.407630 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.407672 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.413373 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.413414 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.419302 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.419352 kernel: audit: type=1400 audit(1747097063.388:510): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.421431 env[1197]: time="2025-05-13T00:44:23.421385973Z" level=info msg="StartContainer for \"4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8\" returns successfully" May 13 00:44:23.388000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.388000 audit: BPF prog-id=72 op=LOAD May 13 00:44:23.388000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000294428 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:23.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653934353630383065316630333436306463663034376362323662 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.392000 audit: BPF prog-id=73 op=LOAD May 13 00:44:23.392000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000294478 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:23.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653934353630383065316630333436306463663034376362323662 May 13 00:44:23.396000 audit: BPF prog-id=73 op=UNLOAD May 13 00:44:23.396000 audit: BPF prog-id=72 op=UNLOAD May 13 00:44:23.396000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:23.396000 audit: BPF prog-id=74 op=LOAD May 13 00:44:23.396000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000294508 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:23.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653934353630383065316630333436306463663034376362323662 May 13 00:44:23.726034 kubelet[1444]: E0513 00:44:23.725922 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:24.291922 kubelet[1444]: E0513 00:44:24.291870 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:24.316033 kubelet[1444]: E0513 00:44:24.315998 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:24.726958 kubelet[1444]: E0513 00:44:24.726835 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:25.013802 env[1197]: time="2025-05-13T00:44:25.013567544Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:44:25.015121 systemd[1]: cri-containerd-4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8.scope: Deactivated successfully. May 13 00:44:25.020000 audit: BPF prog-id=74 op=UNLOAD May 13 00:44:25.028705 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8-rootfs.mount: Deactivated successfully. May 13 00:44:25.069168 kubelet[1444]: I0513 00:44:25.069119 1444 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 00:44:25.317329 kubelet[1444]: E0513 00:44:25.317212 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:25.470617 systemd[1]: Created slice kubepods-besteffort-pod31a470c9_16ed_47fd_b1ab_563ff0b912d2.slice. May 13 00:44:25.541449 kubelet[1444]: I0513 00:44:25.541382 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpsx9\" (UniqueName: \"kubernetes.io/projected/31a470c9-16ed-47fd-b1ab-563ff0b912d2-kube-api-access-xpsx9\") pod \"nginx-deployment-8587fbcb89-k76cd\" (UID: \"31a470c9-16ed-47fd-b1ab-563ff0b912d2\") " pod="default/nginx-deployment-8587fbcb89-k76cd" May 13 00:44:25.617756 env[1197]: time="2025-05-13T00:44:25.617586835Z" level=info msg="shim disconnected" id=4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8 May 13 00:44:25.617756 env[1197]: time="2025-05-13T00:44:25.617640651Z" level=warning msg="cleaning up after shim disconnected" id=4ae9456080e1f03460dcf047cb26b37342dd32746a136f6b62d0f10afee921a8 namespace=k8s.io May 13 00:44:25.617756 env[1197]: time="2025-05-13T00:44:25.617652756Z" level=info msg="cleaning up dead shim" May 13 00:44:25.623384 env[1197]: time="2025-05-13T00:44:25.623339567Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:44:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1865 runtime=io.containerd.runc.v2\n" May 13 00:44:25.727133 kubelet[1444]: E0513 00:44:25.727075 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:25.773702 env[1197]: time="2025-05-13T00:44:25.773636139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-k76cd,Uid:31a470c9-16ed-47fd-b1ab-563ff0b912d2,Namespace:default,Attempt:0,}" May 13 00:44:25.831319 env[1197]: time="2025-05-13T00:44:25.831218331Z" level=error msg="Failed to destroy network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:25.831831 env[1197]: time="2025-05-13T00:44:25.831784917Z" level=error msg="encountered an error cleaning up failed sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:25.831890 env[1197]: time="2025-05-13T00:44:25.831845453Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-k76cd,Uid:31a470c9-16ed-47fd-b1ab-563ff0b912d2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:25.832168 kubelet[1444]: E0513 00:44:25.832112 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:25.832240 kubelet[1444]: E0513 00:44:25.832212 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-k76cd" May 13 00:44:25.832271 kubelet[1444]: E0513 00:44:25.832245 1444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-k76cd" May 13 00:44:25.832340 kubelet[1444]: E0513 00:44:25.832307 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-k76cd_default(31a470c9-16ed-47fd-b1ab-563ff0b912d2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-k76cd_default(31a470c9-16ed-47fd-b1ab-563ff0b912d2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-k76cd" podUID="31a470c9-16ed-47fd-b1ab-563ff0b912d2" May 13 00:44:25.832892 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7-shm.mount: Deactivated successfully. May 13 00:44:26.295234 systemd[1]: Created slice kubepods-besteffort-pod5b0b1d6b_0aa7_43d2_8772_f03ed0e0a42c.slice. May 13 00:44:26.297177 env[1197]: time="2025-05-13T00:44:26.297136113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wvf9j,Uid:5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c,Namespace:calico-system,Attempt:0,}" May 13 00:44:26.319606 kubelet[1444]: I0513 00:44:26.319575 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:26.320159 env[1197]: time="2025-05-13T00:44:26.320117996Z" level=info msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" May 13 00:44:26.321930 kubelet[1444]: E0513 00:44:26.321893 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:26.322740 env[1197]: time="2025-05-13T00:44:26.322680295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:44:26.342396 env[1197]: time="2025-05-13T00:44:26.342336008Z" level=error msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" failed" error="failed to destroy network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:26.342575 kubelet[1444]: E0513 00:44:26.342526 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:26.342626 kubelet[1444]: E0513 00:44:26.342584 1444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7"} May 13 00:44:26.342653 kubelet[1444]: E0513 00:44:26.342631 1444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31a470c9-16ed-47fd-b1ab-563ff0b912d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:26.342716 kubelet[1444]: E0513 00:44:26.342652 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31a470c9-16ed-47fd-b1ab-563ff0b912d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-k76cd" podUID="31a470c9-16ed-47fd-b1ab-563ff0b912d2" May 13 00:44:26.381000 audit[1939]: NETFILTER_CFG table=filter:67 family=2 entries=16 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:26.381000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe7bb1bf80 a2=0 a3=7ffe7bb1bf6c items=0 ppid=1665 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:26.388000 audit[1939]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:26.388000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe7bb1bf80 a2=0 a3=0 items=0 ppid=1665 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:26.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:26.447964 env[1197]: time="2025-05-13T00:44:26.447882493Z" level=error msg="Failed to destroy network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:26.448332 env[1197]: time="2025-05-13T00:44:26.448274777Z" level=error msg="encountered an error cleaning up failed sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:26.448372 env[1197]: time="2025-05-13T00:44:26.448346144Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wvf9j,Uid:5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:26.448641 kubelet[1444]: E0513 00:44:26.448585 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:26.448763 kubelet[1444]: E0513 00:44:26.448645 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:26.448763 kubelet[1444]: E0513 00:44:26.448665 1444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wvf9j" May 13 00:44:26.448763 kubelet[1444]: E0513 00:44:26.448707 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wvf9j_calico-system(5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wvf9j_calico-system(5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:26.449368 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b-shm.mount: Deactivated successfully. May 13 00:44:26.728266 kubelet[1444]: E0513 00:44:26.728127 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:27.240000 audit[1977]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:27.240000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd3ad915b0 a2=0 a3=7ffd3ad9159c items=0 ppid=1665 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:27.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:27.245000 audit[1977]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:27.245000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd3ad915b0 a2=0 a3=7ffd3ad9159c items=0 ppid=1665 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:27.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:27.323850 kubelet[1444]: I0513 00:44:27.323814 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:27.324326 env[1197]: time="2025-05-13T00:44:27.324296961Z" level=info msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" May 13 00:44:27.347858 env[1197]: time="2025-05-13T00:44:27.347789952Z" level=error msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" failed" error="failed to destroy network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:44:27.348084 kubelet[1444]: E0513 00:44:27.348038 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:27.348145 kubelet[1444]: E0513 00:44:27.348096 1444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b"} May 13 00:44:27.348145 kubelet[1444]: E0513 00:44:27.348136 1444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:44:27.348252 kubelet[1444]: E0513 00:44:27.348164 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wvf9j" podUID="5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c" May 13 00:44:27.729389 kubelet[1444]: E0513 00:44:27.729257 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:28.701731 kubelet[1444]: E0513 00:44:28.701660 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:28.729370 kubelet[1444]: E0513 00:44:28.729335 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:29.224000 audit[2005]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.225706 kernel: kauditd_printk_skb: 46 callbacks suppressed May 13 00:44:29.225764 kernel: audit: type=1325 audit(1747097069.224:520): table=filter:71 family=2 entries=10 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.224000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff319ff800 a2=0 a3=7fff319ff7ec items=0 ppid=1665 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.233310 kernel: audit: type=1300 audit(1747097069.224:520): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff319ff800 a2=0 a3=7fff319ff7ec items=0 ppid=1665 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.233353 kernel: audit: type=1327 audit(1747097069.224:520): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.237000 audit[2005]: NETFILTER_CFG table=nat:72 family=2 entries=44 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.237000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff319ff800 a2=0 a3=7fff319ff7ec items=0 ppid=1665 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.245450 kernel: audit: type=1325 audit(1747097069.237:521): table=nat:72 family=2 entries=44 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.245518 kernel: audit: type=1300 audit(1747097069.237:521): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff319ff800 a2=0 a3=7fff319ff7ec items=0 ppid=1665 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.245544 kernel: audit: type=1327 audit(1747097069.237:521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.237000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.253000 audit[2007]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.253000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff41775c70 a2=0 a3=7fff41775c5c items=0 ppid=1665 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.261767 kernel: audit: type=1325 audit(1747097069.253:522): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.261816 kernel: audit: type=1300 audit(1747097069.253:522): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff41775c70 a2=0 a3=7fff41775c5c items=0 ppid=1665 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.261840 kernel: audit: type=1327 audit(1747097069.253:522): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.266000 audit[2007]: NETFILTER_CFG table=nat:74 family=2 entries=56 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.266000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff41775c70 a2=0 a3=7fff41775c5c items=0 ppid=1665 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:29.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:29.269583 kernel: audit: type=1325 audit(1747097069.266:523): table=nat:74 family=2 entries=56 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:29.729504 kubelet[1444]: E0513 00:44:29.729470 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:30.730414 kubelet[1444]: E0513 00:44:30.730359 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:31.731112 kubelet[1444]: E0513 00:44:31.731041 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:32.518010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2990162832.mount: Deactivated successfully. May 13 00:44:32.731607 kubelet[1444]: E0513 00:44:32.731540 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:33.732439 kubelet[1444]: E0513 00:44:33.732368 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:33.820120 env[1197]: time="2025-05-13T00:44:33.820028813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.822403 env[1197]: time="2025-05-13T00:44:33.822287336Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.823660 env[1197]: time="2025-05-13T00:44:33.823625614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.825218 env[1197]: time="2025-05-13T00:44:33.825184170Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:33.825869 env[1197]: time="2025-05-13T00:44:33.825822299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:44:33.835222 env[1197]: time="2025-05-13T00:44:33.835174420Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:44:33.850623 env[1197]: time="2025-05-13T00:44:33.850580086Z" level=info msg="CreateContainer within sandbox \"139133dc9285cfa60ecd3e3745e834f40e7e262fd020b10f86c63229fbec5eac\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4d4354392c8576016ceaa75301a7f77a7c8fd9f70bfa08db0914f67adedcbe2f\"" May 13 00:44:33.851063 env[1197]: time="2025-05-13T00:44:33.851014342Z" level=info msg="StartContainer for \"4d4354392c8576016ceaa75301a7f77a7c8fd9f70bfa08db0914f67adedcbe2f\"" May 13 00:44:33.864447 systemd[1]: Started cri-containerd-4d4354392c8576016ceaa75301a7f77a7c8fd9f70bfa08db0914f67adedcbe2f.scope. May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f66f8ba8588 items=0 ppid=1511 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343335343339326338353736303136636561613735333031613766 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.878000 audit: BPF prog-id=75 op=LOAD May 13 00:44:33.878000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000400128 items=0 ppid=1511 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343335343339326338353736303136636561613735333031613766 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit: BPF prog-id=76 op=LOAD May 13 00:44:33.879000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000400178 items=0 ppid=1511 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343335343339326338353736303136636561613735333031613766 May 13 00:44:33.879000 audit: BPF prog-id=76 op=UNLOAD May 13 00:44:33.879000 audit: BPF prog-id=75 op=UNLOAD May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { perfmon } for pid=2020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit[2020]: AVC avc: denied { bpf } for pid=2020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:33.879000 audit: BPF prog-id=77 op=LOAD May 13 00:44:33.879000 audit[2020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000400208 items=0 ppid=1511 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343335343339326338353736303136636561613735333031613766 May 13 00:44:33.890671 env[1197]: time="2025-05-13T00:44:33.890601873Z" level=info msg="StartContainer for \"4d4354392c8576016ceaa75301a7f77a7c8fd9f70bfa08db0914f67adedcbe2f\" returns successfully" May 13 00:44:33.958847 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:44:33.958969 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:44:34.337070 kubelet[1444]: E0513 00:44:34.336654 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:34.553767 kubelet[1444]: I0513 00:44:34.553698 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6vkn8" podStartSLOduration=4.722189719 podStartE2EDuration="25.55367632s" podCreationTimestamp="2025-05-13 00:44:09 +0000 UTC" firstStartedPulling="2025-05-13 00:44:12.995403513 +0000 UTC m=+4.601899307" lastFinishedPulling="2025-05-13 00:44:33.826890114 +0000 UTC m=+25.433385908" observedRunningTime="2025-05-13 00:44:34.553139209 +0000 UTC m=+26.159635013" watchObservedRunningTime="2025-05-13 00:44:34.55367632 +0000 UTC m=+26.160172124" May 13 00:44:34.733112 kubelet[1444]: E0513 00:44:34.732967 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:35.023000 audit[2090]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.046239 kernel: kauditd_printk_skb: 45 callbacks suppressed May 13 00:44:35.046403 kernel: audit: type=1325 audit(1747097075.023:530): table=filter:75 family=2 entries=10 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.023000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc5d40d8a0 a2=0 a3=7ffc5d40d88c items=0 ppid=1665 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.053073 kernel: audit: type=1300 audit(1747097075.023:530): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc5d40d8a0 a2=0 a3=7ffc5d40d88c items=0 ppid=1665 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.053196 kernel: audit: type=1327 audit(1747097075.023:530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.058000 audit[2090]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.058000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5d40d8a0 a2=0 a3=7ffc5d40d88c items=0 ppid=1665 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.066209 kernel: audit: type=1325 audit(1747097075.058:531): table=nat:76 family=2 entries=20 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.066357 kernel: audit: type=1300 audit(1747097075.058:531): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5d40d8a0 a2=0 a3=7ffc5d40d88c items=0 ppid=1665 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.066381 kernel: audit: type=1327 audit(1747097075.058:531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.338258 kubelet[1444]: E0513 00:44:35.338159 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:44:35.733682 kubelet[1444]: E0513 00:44:35.733486 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:35.782000 audit[2127]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.782000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff352099f0 a2=0 a3=7fff352099dc items=0 ppid=1665 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.792099 kernel: audit: type=1325 audit(1747097075.782:532): table=filter:77 family=2 entries=10 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.792151 kernel: audit: type=1300 audit(1747097075.782:532): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff352099f0 a2=0 a3=7fff352099dc items=0 ppid=1665 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.792175 kernel: audit: type=1327 audit(1747097075.782:532): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.799000 audit[2127]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:35.799000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff352099f0 a2=0 a3=7fff352099dc items=0 ppid=1665 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:35.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:35.804579 kernel: audit: type=1325 audit(1747097075.799:533): table=nat:78 family=2 entries=20 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:36.319000 audit[2129]: NETFILTER_CFG table=filter:79 family=2 entries=9 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:36.319000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc299ed2a0 a2=0 a3=7ffc299ed28c items=0 ppid=1665 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:36.327000 audit[2129]: NETFILTER_CFG table=nat:80 family=2 entries=27 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:36.327000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc299ed2a0 a2=0 a3=7ffc299ed28c items=0 ppid=1665 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:36.496000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=20711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.496000 audit[2188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff7775a26 a2=241 a3=1b6 items=1 ppid=2149 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.496000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:44:36.496000 audit: PATH item=0 name="/dev/fd/63" inode=20706 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.496000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.504000 audit[2201]: AVC avc: denied { write } for pid=2201 comm="tee" name="fd" dev="proc" ino=20186 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.504000 audit[2201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9c72fa26 a2=241 a3=1b6 items=1 ppid=2139 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.504000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:44:36.504000 audit: PATH item=0 name="/dev/fd/63" inode=20175 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.506000 audit[2205]: AVC avc: denied { write } for pid=2205 comm="tee" name="fd" dev="proc" ino=20190 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.506000 audit[2205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb8657a17 a2=241 a3=1b6 items=1 ppid=2138 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.506000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:44:36.506000 audit: PATH item=0 name="/dev/fd/63" inode=20180 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.507000 audit[2200]: AVC avc: denied { write } for pid=2200 comm="tee" name="fd" dev="proc" ino=20715 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.507000 audit[2200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff99ddea27 a2=241 a3=1b6 items=1 ppid=2143 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.507000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:44:36.507000 audit: PATH item=0 name="/dev/fd/63" inode=19127 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.509000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=19135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.509000 audit[2207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff736a4a28 a2=241 a3=1b6 items=1 ppid=2145 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.509000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:44:36.509000 audit: PATH item=0 name="/dev/fd/63" inode=19132 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.506000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.516000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=20194 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.516000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd09429a16 a2=241 a3=1b6 items=1 ppid=2153 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.516000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:44:36.516000 audit: PATH item=0 name="/dev/fd/63" inode=20183 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.517000 audit[2217]: AVC avc: denied { write } for pid=2217 comm="tee" name="fd" dev="proc" ino=19139 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:44:36.517000 audit[2217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4fa31a26 a2=241 a3=1b6 items=1 ppid=2151 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.517000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:44:36.517000 audit: PATH item=0 name="/dev/fd/63" inode=20719 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:36.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit: BPF prog-id=78 op=LOAD May 13 00:44:36.571000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb23a2e40 a2=98 a3=3 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.571000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.571000 audit: BPF prog-id=78 op=UNLOAD May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit: BPF prog-id=79 op=LOAD May 13 00:44:36.571000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb23a2c20 a2=74 a3=540051 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.571000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.571000 audit: BPF prog-id=79 op=UNLOAD May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.571000 audit: BPF prog-id=80 op=LOAD May 13 00:44:36.571000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb23a2c50 a2=94 a3=2 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.571000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.571000 audit: BPF prog-id=80 op=UNLOAD May 13 00:44:36.678000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit: BPF prog-id=81 op=LOAD May 13 00:44:36.678000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb23a2b10 a2=40 a3=1 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.678000 audit: BPF prog-id=81 op=UNLOAD May 13 00:44:36.678000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.678000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb23a2be0 a2=50 a3=7fffb23a2cc0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2b20 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb23a2b50 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb23a2a60 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2b70 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2b50 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2b40 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2b70 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb23a2b50 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb23a2b70 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb23a2b40 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb23a2bb0 a2=28 a3=0 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb23a2960 a2=50 a3=1 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit: BPF prog-id=82 op=LOAD May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb23a2960 a2=94 a3=5 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit: BPF prog-id=82 op=UNLOAD May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb23a2a10 a2=50 a3=1 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb23a2b30 a2=4 a3=38 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb23a2b80 a2=94 a3=6 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb23a2330 a2=94 a3=83 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.686000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.686000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb23a2330 a2=94 a3=83 items=0 ppid=2150 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit: BPF prog-id=83 op=LOAD May 13 00:44:36.693000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb4d151e0 a2=98 a3=1999999999999999 items=0 ppid=2150 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:36.693000 audit: BPF prog-id=83 op=UNLOAD May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit: BPF prog-id=84 op=LOAD May 13 00:44:36.693000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb4d150c0 a2=74 a3=ffff items=0 ppid=2150 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:36.693000 audit: BPF prog-id=84 op=UNLOAD May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.693000 audit: BPF prog-id=85 op=LOAD May 13 00:44:36.693000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb4d15100 a2=40 a3=7fffb4d152e0 items=0 ppid=2150 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:44:36.693000 audit: BPF prog-id=85 op=UNLOAD May 13 00:44:36.734243 kubelet[1444]: E0513 00:44:36.734194 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:36.735135 systemd-networkd[1029]: vxlan.calico: Link UP May 13 00:44:36.735140 systemd-networkd[1029]: vxlan.calico: Gained carrier May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit: BPF prog-id=86 op=LOAD May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc22e97c00 a2=98 a3=ffffffff items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.752000 audit: BPF prog-id=86 op=UNLOAD May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit: BPF prog-id=87 op=LOAD May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc22e97a10 a2=74 a3=540051 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.752000 audit: BPF prog-id=87 op=UNLOAD May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit: BPF prog-id=88 op=LOAD May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc22e97a40 a2=94 a3=2 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.752000 audit: BPF prog-id=88 op=UNLOAD May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e97910 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc22e97940 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.752000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.752000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc22e97850 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e97960 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e97940 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e97930 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e97960 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc22e97940 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc22e97960 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc22e97930 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc22e979a0 a2=28 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit: BPF prog-id=89 op=LOAD May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc22e97810 a2=40 a3=0 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit: BPF prog-id=89 op=UNLOAD May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc22e97800 a2=50 a3=2800 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc22e97800 a2=50 a3=2800 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.753000 audit: BPF prog-id=90 op=LOAD May 13 00:44:36.753000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc22e97020 a2=94 a3=2 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.754000 audit: BPF prog-id=90 op=UNLOAD May 13 00:44:36.754000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.754000 audit: BPF prog-id=91 op=LOAD May 13 00:44:36.754000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc22e97120 a2=94 a3=30 items=0 ppid=2150 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit: BPF prog-id=92 op=LOAD May 13 00:44:36.756000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1f5c6e90 a2=98 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.756000 audit: BPF prog-id=92 op=UNLOAD May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.756000 audit: BPF prog-id=93 op=LOAD May 13 00:44:36.756000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1f5c6c70 a2=74 a3=540051 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.756000 audit: BPF prog-id=93 op=UNLOAD May 13 00:44:36.757000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.757000 audit: BPF prog-id=94 op=LOAD May 13 00:44:36.757000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1f5c6ca0 a2=94 a3=2 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.757000 audit: BPF prog-id=94 op=UNLOAD May 13 00:44:36.864000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.864000 audit: BPF prog-id=95 op=LOAD May 13 00:44:36.864000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1f5c6b60 a2=40 a3=1 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.865000 audit: BPF prog-id=95 op=UNLOAD May 13 00:44:36.865000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.865000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1f5c6c30 a2=50 a3=7fff1f5c6d10 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.865000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6b70 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1f5c6ba0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1f5c6ab0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6bc0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6ba0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6b90 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6bc0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1f5c6ba0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1f5c6bc0 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1f5c6b90 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1f5c6c00 a2=28 a3=0 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1f5c69b0 a2=50 a3=1 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit: BPF prog-id=96 op=LOAD May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1f5c69b0 a2=94 a3=5 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit: BPF prog-id=96 op=UNLOAD May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1f5c6a60 a2=50 a3=1 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1f5c6b80 a2=4 a3=38 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.872000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.872000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1f5c6bd0 a2=94 a3=6 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1f5c6380 a2=94 a3=83 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1f5c6380 a2=94 a3=83 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1f5c7dc0 a2=10 a3=208 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1f5c7c60 a2=10 a3=3 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1f5c7c00 a2=10 a3=3 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.873000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:36.873000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1f5c7c00 a2=10 a3=7 items=0 ppid=2150 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:44:36.879000 audit: BPF prog-id=91 op=UNLOAD May 13 00:44:36.914000 audit[2318]: NETFILTER_CFG table=mangle:81 family=2 entries=16 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:36.914000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffadd407e0 a2=0 a3=7fffadd407cc items=0 ppid=2150 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.914000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:36.920000 audit[2320]: NETFILTER_CFG table=nat:82 family=2 entries=15 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:36.920000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffea1cdbdd0 a2=0 a3=7ffea1cdbdbc items=0 ppid=2150 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.920000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:36.923000 audit[2322]: NETFILTER_CFG table=filter:83 family=2 entries=39 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:36.923000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc6f625370 a2=0 a3=7ffc6f62535c items=0 ppid=2150 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:36.923000 audit[2317]: NETFILTER_CFG table=raw:84 family=2 entries=21 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:36.923000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffcc4eef00 a2=0 a3=7fffcc4eeeec items=0 ppid=2150 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:37.292081 env[1197]: time="2025-05-13T00:44:37.291939008Z" level=info msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" May 13 00:44:37.341000 audit[2359]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:37.341000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd992d6350 a2=0 a3=7ffd992d633c items=0 ppid=1665 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:37.349000 audit[2359]: NETFILTER_CFG table=nat:86 family=2 entries=34 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:37.349000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd992d6350 a2=0 a3=7ffd992d633c items=0 ppid=1665 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" iface="eth0" netns="/var/run/netns/cni-2fa9dead-6f3b-3bc1-9daa-1fe71eaf4a4b" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" iface="eth0" netns="/var/run/netns/cni-2fa9dead-6f3b-3bc1-9daa-1fe71eaf4a4b" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" iface="eth0" netns="/var/run/netns/cni-2fa9dead-6f3b-3bc1-9daa-1fe71eaf4a4b" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.331 [INFO][2343] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.352 [INFO][2352] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.353 [INFO][2352] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.353 [INFO][2352] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.358 [WARNING][2352] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.359 [INFO][2352] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.360 [INFO][2352] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:37.363934 env[1197]: 2025-05-13 00:44:37.362 [INFO][2343] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:44:37.364545 env[1197]: time="2025-05-13T00:44:37.364070723Z" level=info msg="TearDown network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" successfully" May 13 00:44:37.364545 env[1197]: time="2025-05-13T00:44:37.364114999Z" level=info msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" returns successfully" May 13 00:44:37.364913 env[1197]: time="2025-05-13T00:44:37.364857848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-k76cd,Uid:31a470c9-16ed-47fd-b1ab-563ff0b912d2,Namespace:default,Attempt:1,}" May 13 00:44:37.365961 systemd[1]: run-netns-cni\x2d2fa9dead\x2d6f3b\x2d3bc1\x2d9daa\x2d1fe71eaf4a4b.mount: Deactivated successfully. May 13 00:44:37.482888 systemd-networkd[1029]: calic93ed407f03: Link UP May 13 00:44:37.485067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic93ed407f03: link becomes ready May 13 00:44:37.484470 systemd-networkd[1029]: calic93ed407f03: Gained carrier May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.419 [INFO][2361] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0 nginx-deployment-8587fbcb89- default 31a470c9-16ed-47fd-b1ab-563ff0b912d2 1009 0 2025-05-13 00:44:25 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.85 nginx-deployment-8587fbcb89-k76cd eth0 default [] [] [kns.default ksa.default.default] calic93ed407f03 [] []}} ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.419 [INFO][2361] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.444 [INFO][2377] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" HandleID="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.451 [INFO][2377] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" HandleID="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c4840), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.85", "pod":"nginx-deployment-8587fbcb89-k76cd", "timestamp":"2025-05-13 00:44:37.44454152 +0000 UTC"}, Hostname:"10.0.0.85", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.451 [INFO][2377] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.451 [INFO][2377] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.451 [INFO][2377] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.85' May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.453 [INFO][2377] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.456 [INFO][2377] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.461 [INFO][2377] ipam/ipam.go 489: Trying affinity for 192.168.122.128/26 host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.463 [INFO][2377] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.464 [INFO][2377] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.464 [INFO][2377] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.128/26 handle="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.466 [INFO][2377] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2 May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.469 [INFO][2377] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.128/26 handle="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.478 [INFO][2377] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.129/26] block=192.168.122.128/26 handle="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.478 [INFO][2377] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.129/26] handle="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" host="10.0.0.85" May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.478 [INFO][2377] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:37.501740 env[1197]: 2025-05-13 00:44:37.479 [INFO][2377] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.129/26] IPv6=[] ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" HandleID="k8s-pod-network.40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.480 [INFO][2361] cni-plugin/k8s.go 386: Populated endpoint ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"31a470c9-16ed-47fd-b1ab-563ff0b912d2", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-k76cd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic93ed407f03", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.481 [INFO][2361] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.129/32] ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.481 [INFO][2361] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic93ed407f03 ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.484 [INFO][2361] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.484 [INFO][2361] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"31a470c9-16ed-47fd-b1ab-563ff0b912d2", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2", Pod:"nginx-deployment-8587fbcb89-k76cd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic93ed407f03", MAC:"9a:c6:99:5b:88:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:37.502465 env[1197]: 2025-05-13 00:44:37.499 [INFO][2361] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2" Namespace="default" Pod="nginx-deployment-8587fbcb89-k76cd" WorkloadEndpoint="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:44:37.508000 audit[2400]: NETFILTER_CFG table=filter:87 family=2 entries=34 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:37.508000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffd2c798b10 a2=0 a3=7ffd2c798afc items=0 ppid=2150 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:37.513306 env[1197]: time="2025-05-13T00:44:37.513235323Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:37.513306 env[1197]: time="2025-05-13T00:44:37.513290572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:37.513393 env[1197]: time="2025-05-13T00:44:37.513303932Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:37.513529 env[1197]: time="2025-05-13T00:44:37.513475586Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2 pid=2408 runtime=io.containerd.runc.v2 May 13 00:44:37.527380 systemd[1]: Started cri-containerd-40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2.scope. May 13 00:44:37.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit: BPF prog-id=97 op=LOAD May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2408 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613732653134383263373137366434626131636561633762333238 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2408 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613732653134383263373137366434626131636561633762333238 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit: BPF prog-id=98 op=LOAD May 13 00:44:37.536000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00031d900 items=0 ppid=2408 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613732653134383263373137366434626131636561633762333238 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit: BPF prog-id=99 op=LOAD May 13 00:44:37.536000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00031d948 items=0 ppid=2408 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613732653134383263373137366434626131636561633762333238 May 13 00:44:37.536000 audit: BPF prog-id=99 op=UNLOAD May 13 00:44:37.536000 audit: BPF prog-id=98 op=UNLOAD May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:37.536000 audit: BPF prog-id=100 op=LOAD May 13 00:44:37.536000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00031dd58 items=0 ppid=2408 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613732653134383263373137366434626131636561633762333238 May 13 00:44:37.537912 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:37.559597 env[1197]: time="2025-05-13T00:44:37.557646320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-k76cd,Uid:31a470c9-16ed-47fd-b1ab-563ff0b912d2,Namespace:default,Attempt:1,} returns sandbox id \"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2\"" May 13 00:44:37.559597 env[1197]: time="2025-05-13T00:44:37.558893277Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:44:37.737731 kubelet[1444]: E0513 00:44:37.734803 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:38.735515 kubelet[1444]: E0513 00:44:38.735456 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:38.798826 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL May 13 00:44:39.119083 systemd-networkd[1029]: calic93ed407f03: Gained IPv6LL May 13 00:44:39.736230 kubelet[1444]: E0513 00:44:39.736167 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:40.737153 kubelet[1444]: E0513 00:44:40.737102 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:41.737405 kubelet[1444]: E0513 00:44:41.737367 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:41.923883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2401372151.mount: Deactivated successfully. May 13 00:44:42.291970 env[1197]: time="2025-05-13T00:44:42.291921454Z" level=info msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.329 [INFO][2463] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.329 [INFO][2463] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" iface="eth0" netns="/var/run/netns/cni-281de74f-6ef9-8d8d-68a5-07eed8006836" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.329 [INFO][2463] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" iface="eth0" netns="/var/run/netns/cni-281de74f-6ef9-8d8d-68a5-07eed8006836" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.330 [INFO][2463] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" iface="eth0" netns="/var/run/netns/cni-281de74f-6ef9-8d8d-68a5-07eed8006836" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.330 [INFO][2463] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.330 [INFO][2463] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.352 [INFO][2471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.352 [INFO][2471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.352 [INFO][2471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.372 [WARNING][2471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.373 [INFO][2471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.374 [INFO][2471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:42.376586 env[1197]: 2025-05-13 00:44:42.375 [INFO][2463] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:44:42.378213 systemd[1]: run-netns-cni\x2d281de74f\x2d6ef9\x2d8d8d\x2d68a5\x2d07eed8006836.mount: Deactivated successfully. May 13 00:44:42.378483 env[1197]: time="2025-05-13T00:44:42.378449312Z" level=info msg="TearDown network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" successfully" May 13 00:44:42.378600 env[1197]: time="2025-05-13T00:44:42.378580638Z" level=info msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" returns successfully" May 13 00:44:42.379314 env[1197]: time="2025-05-13T00:44:42.379275803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wvf9j,Uid:5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c,Namespace:calico-system,Attempt:1,}" May 13 00:44:42.661733 systemd-networkd[1029]: cali651fff514ec: Link UP May 13 00:44:42.664965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:44:42.665030 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali651fff514ec: link becomes ready May 13 00:44:42.665819 systemd-networkd[1029]: cali651fff514ec: Gained carrier May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.610 [INFO][2481] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.85-k8s-csi--node--driver--wvf9j-eth0 csi-node-driver- calico-system 5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c 1052 0 2025-05-13 00:44:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.85 csi-node-driver-wvf9j eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali651fff514ec [] []}} ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.610 [INFO][2481] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.631 [INFO][2496] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" HandleID="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.639 [INFO][2496] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" HandleID="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042dba0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.85", "pod":"csi-node-driver-wvf9j", "timestamp":"2025-05-13 00:44:42.631440161 +0000 UTC"}, Hostname:"10.0.0.85", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.639 [INFO][2496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.639 [INFO][2496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.639 [INFO][2496] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.85' May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.640 [INFO][2496] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.643 [INFO][2496] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.646 [INFO][2496] ipam/ipam.go 489: Trying affinity for 192.168.122.128/26 host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.648 [INFO][2496] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.649 [INFO][2496] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.649 [INFO][2496] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.128/26 handle="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.650 [INFO][2496] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52 May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.654 [INFO][2496] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.128/26 handle="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.658 [INFO][2496] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.130/26] block=192.168.122.128/26 handle="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.658 [INFO][2496] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.130/26] handle="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" host="10.0.0.85" May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.658 [INFO][2496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:42.677466 env[1197]: 2025-05-13 00:44:42.658 [INFO][2496] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.130/26] IPv6=[] ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" HandleID="k8s-pod-network.8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.659 [INFO][2481] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-csi--node--driver--wvf9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"", Pod:"csi-node-driver-wvf9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali651fff514ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.659 [INFO][2481] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.130/32] ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.659 [INFO][2481] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali651fff514ec ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.662 [INFO][2481] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.666 [INFO][2481] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-csi--node--driver--wvf9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52", Pod:"csi-node-driver-wvf9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali651fff514ec", MAC:"e6:82:9a:25:e3:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:42.678459 env[1197]: 2025-05-13 00:44:42.676 [INFO][2481] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52" Namespace="calico-system" Pod="csi-node-driver-wvf9j" WorkloadEndpoint="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:44:42.684000 audit[2521]: NETFILTER_CFG table=filter:88 family=2 entries=38 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:42.687190 kernel: kauditd_printk_skb: 589 callbacks suppressed May 13 00:44:42.687239 kernel: audit: type=1325 audit(1747097082.684:659): table=filter:88 family=2 entries=38 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:42.684000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc2910b2a0 a2=0 a3=7ffc2910b28c items=0 ppid=2150 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.694395 kernel: audit: type=1300 audit(1747097082.684:659): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc2910b2a0 a2=0 a3=7ffc2910b28c items=0 ppid=2150 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.694434 kernel: audit: type=1327 audit(1747097082.684:659): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:42.684000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:42.738437 kubelet[1444]: E0513 00:44:42.738409 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:42.816775 env[1197]: time="2025-05-13T00:44:42.816694285Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:42.816775 env[1197]: time="2025-05-13T00:44:42.816739871Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:42.816775 env[1197]: time="2025-05-13T00:44:42.816753169Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:42.817127 env[1197]: time="2025-05-13T00:44:42.817099148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52 pid=2529 runtime=io.containerd.runc.v2 May 13 00:44:42.829261 systemd[1]: Started cri-containerd-8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52.scope. May 13 00:44:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.849587 kernel: audit: type=1400 audit(1747097082.840:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.849642 kernel: audit: type=1400 audit(1747097082.840:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.849664 kernel: audit: type=1400 audit(1747097082.840:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.850895 kernel: audit: type=1400 audit(1747097082.840:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.853666 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:42.856423 kernel: audit: type=1400 audit(1747097082.840:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.859456 kernel: audit: type=1400 audit(1747097082.840:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.859505 kernel: audit: type=1400 audit(1747097082.840:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.840000 audit: BPF prog-id=101 op=LOAD May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2529 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363239653738366566366236393533656163353439346232643031 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2529 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363239653738366566366236393533656163353439346232643031 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit: BPF prog-id=102 op=LOAD May 13 00:44:42.843000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad120 items=0 ppid=2529 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363239653738366566366236393533656163353439346232643031 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.843000 audit: BPF prog-id=103 op=LOAD May 13 00:44:42.843000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad168 items=0 ppid=2529 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363239653738366566366236393533656163353439346232643031 May 13 00:44:42.846000 audit: BPF prog-id=103 op=UNLOAD May 13 00:44:42.846000 audit: BPF prog-id=102 op=UNLOAD May 13 00:44:42.846000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:42.846000 audit: BPF prog-id=104 op=LOAD May 13 00:44:42.846000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001ad578 items=0 ppid=2529 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363239653738366566366236393533656163353439346232643031 May 13 00:44:42.875227 env[1197]: time="2025-05-13T00:44:42.875191474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wvf9j,Uid:5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c,Namespace:calico-system,Attempt:1,} returns sandbox id \"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52\"" May 13 00:44:43.738943 kubelet[1444]: E0513 00:44:43.738903 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:44.430856 systemd-networkd[1029]: cali651fff514ec: Gained IPv6LL May 13 00:44:44.545486 env[1197]: time="2025-05-13T00:44:44.545406463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:44.547325 env[1197]: time="2025-05-13T00:44:44.547288022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:44.548956 env[1197]: time="2025-05-13T00:44:44.548934361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:44.550658 env[1197]: time="2025-05-13T00:44:44.550608378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:44.551199 env[1197]: time="2025-05-13T00:44:44.551166049Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:44:44.552324 env[1197]: time="2025-05-13T00:44:44.552293106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:44:44.553217 env[1197]: time="2025-05-13T00:44:44.553189684Z" level=info msg="CreateContainer within sandbox \"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 13 00:44:44.564872 env[1197]: time="2025-05-13T00:44:44.564831879Z" level=info msg="CreateContainer within sandbox \"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7bd1d0959a92359bf6cbd657ff5fc37ff88448876432b588ee818f7f3121de0d\"" May 13 00:44:44.565237 env[1197]: time="2025-05-13T00:44:44.565218765Z" level=info msg="StartContainer for \"7bd1d0959a92359bf6cbd657ff5fc37ff88448876432b588ee818f7f3121de0d\"" May 13 00:44:44.580533 systemd[1]: Started cri-containerd-7bd1d0959a92359bf6cbd657ff5fc37ff88448876432b588ee818f7f3121de0d.scope. May 13 00:44:44.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit: BPF prog-id=105 op=LOAD May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2408 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:44.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643164303935396139323335396266366362643635376666356663 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2408 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:44.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643164303935396139323335396266366362643635376666356663 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit: BPF prog-id=106 op=LOAD May 13 00:44:44.589000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028f310 items=0 ppid=2408 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:44.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643164303935396139323335396266366362643635376666356663 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit: BPF prog-id=107 op=LOAD May 13 00:44:44.589000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028f358 items=0 ppid=2408 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:44.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643164303935396139323335396266366362643635376666356663 May 13 00:44:44.589000 audit: BPF prog-id=107 op=UNLOAD May 13 00:44:44.589000 audit: BPF prog-id=106 op=UNLOAD May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:44.589000 audit: BPF prog-id=108 op=LOAD May 13 00:44:44.589000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028f768 items=0 ppid=2408 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:44.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643164303935396139323335396266366362643635376666356663 May 13 00:44:44.601586 env[1197]: time="2025-05-13T00:44:44.601516708Z" level=info msg="StartContainer for \"7bd1d0959a92359bf6cbd657ff5fc37ff88448876432b588ee818f7f3121de0d\" returns successfully" May 13 00:44:44.739951 kubelet[1444]: E0513 00:44:44.739837 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:45.367367 kubelet[1444]: I0513 00:44:45.367294 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-k76cd" podStartSLOduration=13.373655823 podStartE2EDuration="20.367275766s" podCreationTimestamp="2025-05-13 00:44:25 +0000 UTC" firstStartedPulling="2025-05-13 00:44:37.558520695 +0000 UTC m=+29.165016499" lastFinishedPulling="2025-05-13 00:44:44.552140638 +0000 UTC m=+36.158636442" observedRunningTime="2025-05-13 00:44:45.366805221 +0000 UTC m=+36.973301015" watchObservedRunningTime="2025-05-13 00:44:45.367275766 +0000 UTC m=+36.973771570" May 13 00:44:45.740959 kubelet[1444]: E0513 00:44:45.740849 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:46.157290 env[1197]: time="2025-05-13T00:44:46.157180188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:46.159127 env[1197]: time="2025-05-13T00:44:46.159094386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:46.160609 env[1197]: time="2025-05-13T00:44:46.160587444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:46.162058 env[1197]: time="2025-05-13T00:44:46.162029408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:46.162421 env[1197]: time="2025-05-13T00:44:46.162390402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:44:46.164269 env[1197]: time="2025-05-13T00:44:46.164246530Z" level=info msg="CreateContainer within sandbox \"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:44:46.177633 env[1197]: time="2025-05-13T00:44:46.177598283Z" level=info msg="CreateContainer within sandbox \"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"82181908036441aa8ac92ac935df04604c704621239bfbc31fbad33080f49951\"" May 13 00:44:46.177974 env[1197]: time="2025-05-13T00:44:46.177947332Z" level=info msg="StartContainer for \"82181908036441aa8ac92ac935df04604c704621239bfbc31fbad33080f49951\"" May 13 00:44:46.192643 systemd[1]: Started cri-containerd-82181908036441aa8ac92ac935df04604c704621239bfbc31fbad33080f49951.scope. May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdf4c7a75f8 items=0 ppid=2529 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832313831393038303336343431616138616339326163393335646630 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit: BPF prog-id=109 op=LOAD May 13 00:44:46.207000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002233f8 items=0 ppid=2529 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832313831393038303336343431616138616339326163393335646630 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit: BPF prog-id=110 op=LOAD May 13 00:44:46.207000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000223448 items=0 ppid=2529 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832313831393038303336343431616138616339326163393335646630 May 13 00:44:46.207000 audit: BPF prog-id=110 op=UNLOAD May 13 00:44:46.207000 audit: BPF prog-id=109 op=UNLOAD May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:46.207000 audit: BPF prog-id=111 op=LOAD May 13 00:44:46.207000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002234d8 items=0 ppid=2529 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:46.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832313831393038303336343431616138616339326163393335646630 May 13 00:44:46.220193 env[1197]: time="2025-05-13T00:44:46.220150831Z" level=info msg="StartContainer for \"82181908036441aa8ac92ac935df04604c704621239bfbc31fbad33080f49951\" returns successfully" May 13 00:44:46.221064 env[1197]: time="2025-05-13T00:44:46.221032740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:44:46.740995 kubelet[1444]: E0513 00:44:46.740941 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:47.741666 kubelet[1444]: E0513 00:44:47.741588 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:48.106334 update_engine[1193]: I0513 00:44:48.106227 1193 update_attempter.cc:509] Updating boot flags... May 13 00:44:48.331453 env[1197]: time="2025-05-13T00:44:48.331412723Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:48.334829 env[1197]: time="2025-05-13T00:44:48.334780237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:48.337008 env[1197]: time="2025-05-13T00:44:48.336978119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:48.338487 env[1197]: time="2025-05-13T00:44:48.338465750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:48.338901 env[1197]: time="2025-05-13T00:44:48.338819574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:44:48.340361 env[1197]: time="2025-05-13T00:44:48.340340242Z" level=info msg="CreateContainer within sandbox \"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:44:48.358457 env[1197]: time="2025-05-13T00:44:48.358367993Z" level=info msg="CreateContainer within sandbox \"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2058d39c64b72fc84495130a23a29f37155084045fa0a565819f9545d87e9323\"" May 13 00:44:48.358864 env[1197]: time="2025-05-13T00:44:48.358839576Z" level=info msg="StartContainer for \"2058d39c64b72fc84495130a23a29f37155084045fa0a565819f9545d87e9323\"" May 13 00:44:48.384092 kernel: kauditd_printk_skb: 150 callbacks suppressed May 13 00:44:48.384225 kernel: audit: type=1325 audit(1747097088.370:702): table=filter:89 family=2 entries=20 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.384261 kernel: audit: type=1300 audit(1747097088.370:702): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe27e33500 a2=0 a3=7ffe27e334ec items=0 ppid=1665 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.384289 kernel: audit: type=1327 audit(1747097088.370:702): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.370000 audit[2690]: NETFILTER_CFG table=filter:89 family=2 entries=20 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.370000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe27e33500 a2=0 a3=7ffe27e334ec items=0 ppid=1665 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.382175 systemd[1]: run-containerd-runc-k8s.io-2058d39c64b72fc84495130a23a29f37155084045fa0a565819f9545d87e9323-runc.3KuqWP.mount: Deactivated successfully. May 13 00:44:48.383360 systemd[1]: Started cri-containerd-2058d39c64b72fc84495130a23a29f37155084045fa0a565819f9545d87e9323.scope. May 13 00:44:48.388000 audit[2690]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.388000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe27e33500 a2=0 a3=0 items=0 ppid=1665 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.399597 kernel: audit: type=1325 audit(1747097088.388:703): table=nat:90 family=2 entries=22 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.399675 kernel: audit: type=1300 audit(1747097088.388:703): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe27e33500 a2=0 a3=0 items=0 ppid=1665 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.399702 kernel: audit: type=1327 audit(1747097088.388:703): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.405795 kernel: audit: type=1400 audit(1747097088.396:704): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fece82bff88 items=0 ppid=2529 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.408579 systemd[1]: Created slice kubepods-besteffort-poda80a08eb_bd50_4e62_89dc_8943290fddb0.slice. May 13 00:44:48.411527 kernel: audit: type=1300 audit(1747097088.396:704): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fece82bff88 items=0 ppid=2529 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.411612 kernel: audit: type=1327 audit(1747097088.396:704): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353864333963363462373266633834343935313330613233613239 May 13 00:44:48.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353864333963363462373266633834343935313330613233613239 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.419604 kernel: audit: type=1400 audit(1747097088.396:705): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.396000 audit: BPF prog-id=112 op=LOAD May 13 00:44:48.396000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00037e838 items=0 ppid=2529 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353864333963363462373266633834343935313330613233613239 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.397000 audit: BPF prog-id=113 op=LOAD May 13 00:44:48.397000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00037e888 items=0 ppid=2529 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353864333963363462373266633834343935313330613233613239 May 13 00:44:48.400000 audit: BPF prog-id=113 op=UNLOAD May 13 00:44:48.400000 audit: BPF prog-id=112 op=UNLOAD May 13 00:44:48.400000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.400000 audit: BPF prog-id=114 op=LOAD May 13 00:44:48.400000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00037e918 items=0 ppid=2529 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353864333963363462373266633834343935313330613233613239 May 13 00:44:48.410000 audit[2707]: NETFILTER_CFG table=filter:91 family=2 entries=32 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.410000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcf5100840 a2=0 a3=7ffcf510082c items=0 ppid=1665 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.421000 audit[2707]: NETFILTER_CFG table=nat:92 family=2 entries=22 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:48.421000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcf5100840 a2=0 a3=0 items=0 ppid=1665 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:48.467654 kubelet[1444]: I0513 00:44:48.467618 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a80a08eb-bd50-4e62-89dc-8943290fddb0-data\") pod \"nfs-server-provisioner-0\" (UID: \"a80a08eb-bd50-4e62-89dc-8943290fddb0\") " pod="default/nfs-server-provisioner-0" May 13 00:44:48.467884 kubelet[1444]: I0513 00:44:48.467852 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9nb67\" (UniqueName: \"kubernetes.io/projected/a80a08eb-bd50-4e62-89dc-8943290fddb0-kube-api-access-9nb67\") pod \"nfs-server-provisioner-0\" (UID: \"a80a08eb-bd50-4e62-89dc-8943290fddb0\") " pod="default/nfs-server-provisioner-0" May 13 00:44:48.514418 env[1197]: time="2025-05-13T00:44:48.514379680Z" level=info msg="StartContainer for \"2058d39c64b72fc84495130a23a29f37155084045fa0a565819f9545d87e9323\" returns successfully" May 13 00:44:48.701543 kubelet[1444]: E0513 00:44:48.701428 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:48.711263 env[1197]: time="2025-05-13T00:44:48.711220327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a80a08eb-bd50-4e62-89dc-8943290fddb0,Namespace:default,Attempt:0,}" May 13 00:44:48.742785 kubelet[1444]: E0513 00:44:48.742741 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:48.802354 systemd-networkd[1029]: cali60e51b789ff: Link UP May 13 00:44:48.805041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:44:48.805173 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 13 00:44:48.805152 systemd-networkd[1029]: cali60e51b789ff: Gained carrier May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.746 [INFO][2725] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.85-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a80a08eb-bd50-4e62-89dc-8943290fddb0 1098 0 2025-05-13 00:44:48 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.85 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.746 [INFO][2725] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.770 [INFO][2739] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" HandleID="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Workload="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.778 [INFO][2739] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" HandleID="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Workload="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd3f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.85", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-13 00:44:48.770473838 +0000 UTC"}, Hostname:"10.0.0.85", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.778 [INFO][2739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.778 [INFO][2739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.778 [INFO][2739] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.85' May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.780 [INFO][2739] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.783 [INFO][2739] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.786 [INFO][2739] ipam/ipam.go 489: Trying affinity for 192.168.122.128/26 host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.788 [INFO][2739] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.789 [INFO][2739] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.789 [INFO][2739] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.128/26 handle="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.791 [INFO][2739] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0 May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.795 [INFO][2739] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.128/26 handle="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.799 [INFO][2739] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.131/26] block=192.168.122.128/26 handle="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.799 [INFO][2739] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.131/26] handle="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" host="10.0.0.85" May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.799 [INFO][2739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:44:48.814134 env[1197]: 2025-05-13 00:44:48.799 [INFO][2739] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.131/26] IPv6=[] ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" HandleID="k8s-pod-network.83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Workload="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.814973 env[1197]: 2025-05-13 00:44:48.800 [INFO][2725] cni-plugin/k8s.go 386: Populated endpoint ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a80a08eb-bd50-4e62-89dc-8943290fddb0", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:48.814973 env[1197]: 2025-05-13 00:44:48.800 [INFO][2725] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.131/32] ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.814973 env[1197]: 2025-05-13 00:44:48.800 [INFO][2725] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.814973 env[1197]: 2025-05-13 00:44:48.805 [INFO][2725] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.815177 env[1197]: 2025-05-13 00:44:48.805 [INFO][2725] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a80a08eb-bd50-4e62-89dc-8943290fddb0", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"36:76:28:cd:1d:b9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:44:48.815177 env[1197]: 2025-05-13 00:44:48.812 [INFO][2725] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.85-k8s-nfs--server--provisioner--0-eth0" May 13 00:44:48.821000 audit[2760]: NETFILTER_CFG table=filter:93 family=2 entries=44 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:44:48.821000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffd5b93d320 a2=0 a3=7ffd5b93d30c items=0 ppid=2150 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:44:48.824876 env[1197]: time="2025-05-13T00:44:48.824813416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:44:48.824876 env[1197]: time="2025-05-13T00:44:48.824856303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:44:48.824876 env[1197]: time="2025-05-13T00:44:48.824869411Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:44:48.825074 env[1197]: time="2025-05-13T00:44:48.825015459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0 pid=2769 runtime=io.containerd.runc.v2 May 13 00:44:48.835116 systemd[1]: Started cri-containerd-83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0.scope. May 13 00:44:48.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit: BPF prog-id=115 op=LOAD May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653434376664356332363863386261316131316639316666356137 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653434376664356332363863386261316131316639316666356137 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit: BPF prog-id=116 op=LOAD May 13 00:44:48.844000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000229d60 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653434376664356332363863386261316131316639316666356137 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.844000 audit: BPF prog-id=117 op=LOAD May 13 00:44:48.844000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229da8 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653434376664356332363863386261316131316639316666356137 May 13 00:44:48.845000 audit: BPF prog-id=117 op=UNLOAD May 13 00:44:48.845000 audit: BPF prog-id=116 op=UNLOAD May 13 00:44:48.845000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:48.845000 audit: BPF prog-id=118 op=LOAD May 13 00:44:48.845000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00041a1b8 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:48.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653434376664356332363863386261316131316639316666356137 May 13 00:44:48.847284 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:44:48.868202 env[1197]: time="2025-05-13T00:44:48.868142225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a80a08eb-bd50-4e62-89dc-8943290fddb0,Namespace:default,Attempt:0,} returns sandbox id \"83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0\"" May 13 00:44:48.869710 env[1197]: time="2025-05-13T00:44:48.869690250Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 13 00:44:49.260617 kubelet[1444]: I0513 00:44:49.260595 1444 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:44:49.260617 kubelet[1444]: I0513 00:44:49.260622 1444 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:44:49.387737 kubelet[1444]: I0513 00:44:49.387683 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wvf9j" podStartSLOduration=34.924499962 podStartE2EDuration="40.387669892s" podCreationTimestamp="2025-05-13 00:44:09 +0000 UTC" firstStartedPulling="2025-05-13 00:44:42.876217875 +0000 UTC m=+34.482713669" lastFinishedPulling="2025-05-13 00:44:48.339387795 +0000 UTC m=+39.945883599" observedRunningTime="2025-05-13 00:44:49.387509996 +0000 UTC m=+40.994005800" watchObservedRunningTime="2025-05-13 00:44:49.387669892 +0000 UTC m=+40.994165696" May 13 00:44:49.743476 kubelet[1444]: E0513 00:44:49.743353 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:50.510835 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL May 13 00:44:50.744253 kubelet[1444]: E0513 00:44:50.744189 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:51.531166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1644461499.mount: Deactivated successfully. May 13 00:44:51.744716 kubelet[1444]: E0513 00:44:51.744671 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:52.745351 kubelet[1444]: E0513 00:44:52.745275 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:53.728918 env[1197]: time="2025-05-13T00:44:53.728858918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:53.730796 env[1197]: time="2025-05-13T00:44:53.730751490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:53.732469 env[1197]: time="2025-05-13T00:44:53.732447274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:53.734053 env[1197]: time="2025-05-13T00:44:53.734021556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:53.734655 env[1197]: time="2025-05-13T00:44:53.734626060Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 13 00:44:53.736825 env[1197]: time="2025-05-13T00:44:53.736794645Z" level=info msg="CreateContainer within sandbox \"83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 13 00:44:53.745440 kubelet[1444]: E0513 00:44:53.745399 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:53.750739 env[1197]: time="2025-05-13T00:44:53.750695379Z" level=info msg="CreateContainer within sandbox \"83e447fd5c268c8ba1a11f91ff5a765705c73487a5534f20014c95195de698a0\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"78eb72636dd9b70fe5d282ee2228f07aabfb98cfb6d310801f84e41281bdf9a0\"" May 13 00:44:53.751148 env[1197]: time="2025-05-13T00:44:53.751112907Z" level=info msg="StartContainer for \"78eb72636dd9b70fe5d282ee2228f07aabfb98cfb6d310801f84e41281bdf9a0\"" May 13 00:44:53.765162 systemd[1]: Started cri-containerd-78eb72636dd9b70fe5d282ee2228f07aabfb98cfb6d310801f84e41281bdf9a0.scope. May 13 00:44:53.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.776223 kernel: kauditd_printk_skb: 105 callbacks suppressed May 13 00:44:53.776275 kernel: audit: type=1400 audit(1747097093.770:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.776297 kernel: audit: type=1400 audit(1747097093.770:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.781988 kernel: audit: type=1400 audit(1747097093.771:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.782031 kernel: audit: type=1400 audit(1747097093.771:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784858 kernel: audit: type=1400 audit(1747097093.771:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.790764 kernel: audit: type=1400 audit(1747097093.771:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.790844 kernel: audit: type=1400 audit(1747097093.771:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.796540 kernel: audit: type=1400 audit(1747097093.771:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.796615 kernel: audit: type=1400 audit(1747097093.771:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.802201 kernel: audit: type=1400 audit(1747097093.775:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit: BPF prog-id=119 op=LOAD May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2769 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656237323633366464396237306665356432383265653232323866 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2769 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656237323633366464396237306665356432383265653232323866 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.775000 audit: BPF prog-id=120 op=LOAD May 13 00:44:53.775000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003089c0 items=0 ppid=2769 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656237323633366464396237306665356432383265653232323866 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.778000 audit: BPF prog-id=121 op=LOAD May 13 00:44:53.778000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308a08 items=0 ppid=2769 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656237323633366464396237306665356432383265653232323866 May 13 00:44:53.784000 audit: BPF prog-id=121 op=UNLOAD May 13 00:44:53.784000 audit: BPF prog-id=120 op=UNLOAD May 13 00:44:53.784000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:44:53.784000 audit: BPF prog-id=122 op=LOAD May 13 00:44:53.784000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308e18 items=0 ppid=2769 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:53.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656237323633366464396237306665356432383265653232323866 May 13 00:44:53.814716 env[1197]: time="2025-05-13T00:44:53.814686168Z" level=info msg="StartContainer for \"78eb72636dd9b70fe5d282ee2228f07aabfb98cfb6d310801f84e41281bdf9a0\" returns successfully" May 13 00:44:53.848000 audit[2845]: AVC avc: denied { search } for pid=2845 comm="rpcbind" name="crypto" dev="proc" ino=22876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:44:53.848000 audit[2845]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6a5795c0c0 a2=0 a3=0 items=0 ppid=2825 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 key=(null) May 13 00:44:53.848000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 13 00:44:53.877000 audit[2850]: AVC avc: denied { search } for pid=2850 comm="dbus-daemon" name="crypto" dev="proc" ino=22876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:44:53.877000 audit[2850]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f84479f90c0 a2=0 a3=0 items=0 ppid=2825 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 key=(null) May 13 00:44:53.877000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:44:53.880000 audit[2851]: AVC avc: denied { watch } for pid=2851 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c615 tclass=dir permissive=0 May 13 00:44:53.880000 audit[2851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55e854c3bbf0 a2=2c8 a3=7ffc54a107ec items=0 ppid=2825 pid=2851 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 key=(null) May 13 00:44:53.880000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:44:53.883000 audit[2852]: AVC avc: denied { read } for pid=2852 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 13 00:44:53.883000 audit[2852]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb52ecc6320 a1=80000 a2=d a3=7ffd3d9e5a90 items=0 ppid=2825 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 key=(null) May 13 00:44:53.883000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:44:53.884000 audit[2852]: AVC avc: denied { search } for pid=2852 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:44:53.884000 audit[2852]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb52e21a0c0 a2=0 a3=0 items=0 ppid=2825 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c615 key=(null) May 13 00:44:53.884000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:44:54.395858 kubelet[1444]: I0513 00:44:54.395805 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.5293652070000001 podStartE2EDuration="6.395788722s" podCreationTimestamp="2025-05-13 00:44:48 +0000 UTC" firstStartedPulling="2025-05-13 00:44:48.869208385 +0000 UTC m=+40.475704189" lastFinishedPulling="2025-05-13 00:44:53.7356319 +0000 UTC m=+45.342127704" observedRunningTime="2025-05-13 00:44:54.395574432 +0000 UTC m=+46.002070236" watchObservedRunningTime="2025-05-13 00:44:54.395788722 +0000 UTC m=+46.002284526" May 13 00:44:54.405000 audit[2870]: NETFILTER_CFG table=filter:94 family=2 entries=20 op=nft_register_rule pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:54.405000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd44215b30 a2=0 a3=7ffd44215b1c items=0 ppid=1665 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:54.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:54.413000 audit[2870]: NETFILTER_CFG table=nat:95 family=2 entries=106 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:44:54.413000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd44215b30 a2=0 a3=7ffd44215b1c items=0 ppid=1665 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:54.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:44:54.746659 kubelet[1444]: E0513 00:44:54.746498 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:55.747107 kubelet[1444]: E0513 00:44:55.747058 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:56.747619 kubelet[1444]: E0513 00:44:56.747577 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:57.748098 kubelet[1444]: E0513 00:44:57.748023 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:58.748437 kubelet[1444]: E0513 00:44:58.748349 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:44:59.749325 kubelet[1444]: E0513 00:44:59.749265 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:00.750150 kubelet[1444]: E0513 00:45:00.750095 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:01.077467 kubelet[1444]: E0513 00:45:01.075209 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:01.750500 kubelet[1444]: E0513 00:45:01.750469 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:02.750612 kubelet[1444]: E0513 00:45:02.750570 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:03.196265 systemd[1]: Created slice kubepods-besteffort-poded24a034_1155_4741_a3e6_be669e20245f.slice. May 13 00:45:03.248138 kubelet[1444]: I0513 00:45:03.248088 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-792rs\" (UniqueName: \"kubernetes.io/projected/ed24a034-1155-4741-a3e6-be669e20245f-kube-api-access-792rs\") pod \"test-pod-1\" (UID: \"ed24a034-1155-4741-a3e6-be669e20245f\") " pod="default/test-pod-1" May 13 00:45:03.248138 kubelet[1444]: I0513 00:45:03.248131 1444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-31834b3e-2262-4f98-9baf-02db73a8708e\" (UniqueName: \"kubernetes.io/nfs/ed24a034-1155-4741-a3e6-be669e20245f-pvc-31834b3e-2262-4f98-9baf-02db73a8708e\") pod \"test-pod-1\" (UID: \"ed24a034-1155-4741-a3e6-be669e20245f\") " pod="default/test-pod-1" May 13 00:45:03.357000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.360892 kernel: Failed to create system directory netfs May 13 00:45:03.360948 kernel: kauditd_printk_skb: 68 callbacks suppressed May 13 00:45:03.360971 kernel: audit: type=1400 audit(1747097103.357:756): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.361002 kernel: Failed to create system directory netfs May 13 00:45:03.361021 kernel: Failed to create system directory netfs May 13 00:45:03.361039 kernel: Failed to create system directory netfs May 13 00:45:03.357000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.371380 kernel: audit: type=1400 audit(1747097103.357:756): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.371428 kernel: audit: type=1400 audit(1747097103.357:756): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.357000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.357000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.378529 kernel: audit: type=1400 audit(1747097103.357:756): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.357000 audit[2908]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2b75d65e0 a1=153bc a2=55e287ca92b0 a3=5 items=0 ppid=9 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.357000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:45:03.386583 kernel: audit: type=1300 audit(1747097103.357:756): arch=c000003e syscall=175 success=yes exit=0 a0=55e2b75d65e0 a1=153bc a2=55e287ca92b0 a3=5 items=0 ppid=9 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.386681 kernel: audit: type=1327 audit(1747097103.357:756): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.387703 kernel: Failed to create system directory fscache May 13 00:45:03.387795 kernel: audit: type=1400 audit(1747097103.382:757): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.387826 kernel: Failed to create system directory fscache May 13 00:45:03.391340 kernel: audit: type=1400 audit(1747097103.382:757): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.399589 kernel: Failed to create system directory fscache May 13 00:45:03.399646 kernel: audit: type=1400 audit(1747097103.382:757): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.399680 kernel: Failed to create system directory fscache May 13 00:45:03.399719 kernel: audit: type=1400 audit(1747097103.382:757): avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.403615 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.404583 kernel: Failed to create system directory fscache May 13 00:45:03.405096 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.405835 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.406578 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.408036 kernel: Failed to create system directory fscache May 13 00:45:03.408075 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.409678 kernel: Failed to create system directory fscache May 13 00:45:03.409712 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.382000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.411231 kernel: Failed to create system directory fscache May 13 00:45:03.382000 audit[2908]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2b77eb9c0 a1=4c0fc a2=55e287ca92b0 a3=5 items=0 ppid=9 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.382000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:45:03.413589 kernel: FS-Cache: Loaded May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.443060 kernel: Failed to create system directory sunrpc May 13 00:45:03.443147 kernel: Failed to create system directory sunrpc May 13 00:45:03.443167 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.445205 kernel: Failed to create system directory sunrpc May 13 00:45:03.445230 kernel: Failed to create system directory sunrpc May 13 00:45:03.445248 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.446666 kernel: Failed to create system directory sunrpc May 13 00:45:03.446726 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.448736 kernel: Failed to create system directory sunrpc May 13 00:45:03.448765 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.450178 kernel: Failed to create system directory sunrpc May 13 00:45:03.450229 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.450907 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.453131 kernel: Failed to create system directory sunrpc May 13 00:45:03.453167 kernel: Failed to create system directory sunrpc May 13 00:45:03.453187 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.454603 kernel: Failed to create system directory sunrpc May 13 00:45:03.454631 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.456047 kernel: Failed to create system directory sunrpc May 13 00:45:03.456078 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.456778 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.457583 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.459066 kernel: Failed to create system directory sunrpc May 13 00:45:03.459100 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.460577 kernel: Failed to create system directory sunrpc May 13 00:45:03.460609 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.462026 kernel: Failed to create system directory sunrpc May 13 00:45:03.462057 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.462763 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.464190 kernel: Failed to create system directory sunrpc May 13 00:45:03.464213 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.465630 kernel: Failed to create system directory sunrpc May 13 00:45:03.465651 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.467071 kernel: Failed to create system directory sunrpc May 13 00:45:03.467108 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.469219 kernel: Failed to create system directory sunrpc May 13 00:45:03.469242 kernel: Failed to create system directory sunrpc May 13 00:45:03.469257 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.470658 kernel: Failed to create system directory sunrpc May 13 00:45:03.470681 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.472090 kernel: Failed to create system directory sunrpc May 13 00:45:03.472109 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.474247 kernel: Failed to create system directory sunrpc May 13 00:45:03.474273 kernel: Failed to create system directory sunrpc May 13 00:45:03.474291 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.474986 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.475731 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.477217 kernel: Failed to create system directory sunrpc May 13 00:45:03.477249 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.477953 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.478674 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.480128 kernel: Failed to create system directory sunrpc May 13 00:45:03.480172 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.482266 kernel: Failed to create system directory sunrpc May 13 00:45:03.482288 kernel: Failed to create system directory sunrpc May 13 00:45:03.482311 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.483709 kernel: Failed to create system directory sunrpc May 13 00:45:03.483728 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.485147 kernel: Failed to create system directory sunrpc May 13 00:45:03.485165 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.486610 kernel: Failed to create system directory sunrpc May 13 00:45:03.486647 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.488054 kernel: Failed to create system directory sunrpc May 13 00:45:03.488091 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.490203 kernel: Failed to create system directory sunrpc May 13 00:45:03.490237 kernel: Failed to create system directory sunrpc May 13 00:45:03.490258 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.491676 kernel: Failed to create system directory sunrpc May 13 00:45:03.491715 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.494131 kernel: Failed to create system directory sunrpc May 13 00:45:03.494167 kernel: Failed to create system directory sunrpc May 13 00:45:03.494187 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.495914 kernel: Failed to create system directory sunrpc May 13 00:45:03.495942 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.498342 kernel: Failed to create system directory sunrpc May 13 00:45:03.498381 kernel: Failed to create system directory sunrpc May 13 00:45:03.498401 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.500123 kernel: Failed to create system directory sunrpc May 13 00:45:03.500151 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.501896 kernel: Failed to create system directory sunrpc May 13 00:45:03.501928 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.504377 kernel: Failed to create system directory sunrpc May 13 00:45:03.504411 kernel: Failed to create system directory sunrpc May 13 00:45:03.504433 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.505974 kernel: Failed to create system directory sunrpc May 13 00:45:03.506018 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.507755 kernel: Failed to create system directory sunrpc May 13 00:45:03.507783 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.510349 kernel: Failed to create system directory sunrpc May 13 00:45:03.510384 kernel: Failed to create system directory sunrpc May 13 00:45:03.510412 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.512115 kernel: Failed to create system directory sunrpc May 13 00:45:03.512142 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.513732 kernel: Failed to create system directory sunrpc May 13 00:45:03.513756 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.516331 kernel: Failed to create system directory sunrpc May 13 00:45:03.516367 kernel: Failed to create system directory sunrpc May 13 00:45:03.516394 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.518108 kernel: Failed to create system directory sunrpc May 13 00:45:03.518135 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.519872 kernel: Failed to create system directory sunrpc May 13 00:45:03.519909 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.521688 kernel: Failed to create system directory sunrpc May 13 00:45:03.521727 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.524391 kernel: Failed to create system directory sunrpc May 13 00:45:03.524423 kernel: Failed to create system directory sunrpc May 13 00:45:03.524443 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.526217 kernel: Failed to create system directory sunrpc May 13 00:45:03.526255 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.527796 kernel: Failed to create system directory sunrpc May 13 00:45:03.527844 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.529228 kernel: Failed to create system directory sunrpc May 13 00:45:03.529275 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.529945 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.532079 kernel: Failed to create system directory sunrpc May 13 00:45:03.532110 kernel: Failed to create system directory sunrpc May 13 00:45:03.532139 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.534236 kernel: Failed to create system directory sunrpc May 13 00:45:03.534279 kernel: Failed to create system directory sunrpc May 13 00:45:03.534309 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.534974 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.535684 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.537103 kernel: Failed to create system directory sunrpc May 13 00:45:03.537148 kernel: Failed to create system directory sunrpc May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.431000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.539253 kernel: Failed to create system directory sunrpc May 13 00:45:03.539279 kernel: Failed to create system directory sunrpc May 13 00:45:03.548583 kernel: RPC: Registered named UNIX socket transport module. May 13 00:45:03.548624 kernel: RPC: Registered udp transport module. May 13 00:45:03.548639 kernel: RPC: Registered tcp transport module. May 13 00:45:03.550183 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 13 00:45:03.431000 audit[2908]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2b7837ad0 a1=1a814c a2=55e287ca92b0 a3=5 items=6 ppid=9 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.431000 audit: CWD cwd="/" May 13 00:45:03.431000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PATH item=1 name=(null) inode=23064 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PATH item=2 name=(null) inode=23064 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PATH item=3 name=(null) inode=23065 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PATH item=4 name=(null) inode=23064 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PATH item=5 name=(null) inode=23066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:03.431000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.587979 kernel: Failed to create system directory nfs May 13 00:45:03.588009 kernel: Failed to create system directory nfs May 13 00:45:03.588023 kernel: Failed to create system directory nfs May 13 00:45:03.588039 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.588664 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.590035 kernel: Failed to create system directory nfs May 13 00:45:03.590059 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.592086 kernel: Failed to create system directory nfs May 13 00:45:03.592111 kernel: Failed to create system directory nfs May 13 00:45:03.592128 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.594152 kernel: Failed to create system directory nfs May 13 00:45:03.594186 kernel: Failed to create system directory nfs May 13 00:45:03.594208 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.596205 kernel: Failed to create system directory nfs May 13 00:45:03.596238 kernel: Failed to create system directory nfs May 13 00:45:03.596258 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.597595 kernel: Failed to create system directory nfs May 13 00:45:03.597638 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.598967 kernel: Failed to create system directory nfs May 13 00:45:03.599001 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.601047 kernel: Failed to create system directory nfs May 13 00:45:03.601074 kernel: Failed to create system directory nfs May 13 00:45:03.601095 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.603139 kernel: Failed to create system directory nfs May 13 00:45:03.603170 kernel: Failed to create system directory nfs May 13 00:45:03.603195 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.605233 kernel: Failed to create system directory nfs May 13 00:45:03.605267 kernel: Failed to create system directory nfs May 13 00:45:03.605283 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.606681 kernel: Failed to create system directory nfs May 13 00:45:03.606739 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.608147 kernel: Failed to create system directory nfs May 13 00:45:03.608178 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.609610 kernel: Failed to create system directory nfs May 13 00:45:03.609649 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.611066 kernel: Failed to create system directory nfs May 13 00:45:03.611104 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.613212 kernel: Failed to create system directory nfs May 13 00:45:03.613242 kernel: Failed to create system directory nfs May 13 00:45:03.613268 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.614666 kernel: Failed to create system directory nfs May 13 00:45:03.614695 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.616117 kernel: Failed to create system directory nfs May 13 00:45:03.616154 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.617594 kernel: Failed to create system directory nfs May 13 00:45:03.617631 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.619055 kernel: Failed to create system directory nfs May 13 00:45:03.619093 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.621203 kernel: Failed to create system directory nfs May 13 00:45:03.621245 kernel: Failed to create system directory nfs May 13 00:45:03.621263 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.622609 kernel: Failed to create system directory nfs May 13 00:45:03.622630 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.623982 kernel: Failed to create system directory nfs May 13 00:45:03.624009 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.626033 kernel: Failed to create system directory nfs May 13 00:45:03.626061 kernel: Failed to create system directory nfs May 13 00:45:03.626075 kernel: Failed to create system directory nfs May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.578000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.628085 kernel: Failed to create system directory nfs May 13 00:45:03.628110 kernel: Failed to create system directory nfs May 13 00:45:03.648845 kernel: FS-Cache: Netfs 'nfs' registered for caching May 13 00:45:03.578000 audit[2908]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2b7a58a10 a1=16eae4 a2=55e287ca92b0 a3=5 items=0 ppid=9 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.578000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.685206 kernel: Failed to create system directory nfs4 May 13 00:45:03.685260 kernel: Failed to create system directory nfs4 May 13 00:45:03.685281 kernel: Failed to create system directory nfs4 May 13 00:45:03.685303 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.686630 kernel: Failed to create system directory nfs4 May 13 00:45:03.686664 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.688034 kernel: Failed to create system directory nfs4 May 13 00:45:03.688067 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.690137 kernel: Failed to create system directory nfs4 May 13 00:45:03.690170 kernel: Failed to create system directory nfs4 May 13 00:45:03.690192 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.690837 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.692212 kernel: Failed to create system directory nfs4 May 13 00:45:03.692233 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.693634 kernel: Failed to create system directory nfs4 May 13 00:45:03.693657 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.695051 kernel: Failed to create system directory nfs4 May 13 00:45:03.695070 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.697219 kernel: Failed to create system directory nfs4 May 13 00:45:03.697265 kernel: Failed to create system directory nfs4 May 13 00:45:03.697283 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.700820 kernel: Failed to create system directory nfs4 May 13 00:45:03.700851 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.703376 kernel: Failed to create system directory nfs4 May 13 00:45:03.703406 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.704979 kernel: Failed to create system directory nfs4 May 13 00:45:03.705015 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.707237 kernel: Failed to create system directory nfs4 May 13 00:45:03.707278 kernel: Failed to create system directory nfs4 May 13 00:45:03.707292 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.708660 kernel: Failed to create system directory nfs4 May 13 00:45:03.708684 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.710096 kernel: Failed to create system directory nfs4 May 13 00:45:03.710120 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.712216 kernel: Failed to create system directory nfs4 May 13 00:45:03.712235 kernel: Failed to create system directory nfs4 May 13 00:45:03.712253 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.713626 kernel: Failed to create system directory nfs4 May 13 00:45:03.713666 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.715046 kernel: Failed to create system directory nfs4 May 13 00:45:03.715092 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.717178 kernel: Failed to create system directory nfs4 May 13 00:45:03.717226 kernel: Failed to create system directory nfs4 May 13 00:45:03.717249 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.718672 kernel: Failed to create system directory nfs4 May 13 00:45:03.718843 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.720174 kernel: Failed to create system directory nfs4 May 13 00:45:03.720210 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.721650 kernel: Failed to create system directory nfs4 May 13 00:45:03.721703 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.723115 kernel: Failed to create system directory nfs4 May 13 00:45:03.723163 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.724658 kernel: Failed to create system directory nfs4 May 13 00:45:03.724707 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.726108 kernel: Failed to create system directory nfs4 May 13 00:45:03.726147 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.727632 kernel: Failed to create system directory nfs4 May 13 00:45:03.727671 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.729105 kernel: Failed to create system directory nfs4 May 13 00:45:03.729134 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.730585 kernel: Failed to create system directory nfs4 May 13 00:45:03.730616 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.732006 kernel: Failed to create system directory nfs4 May 13 00:45:03.732036 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.734180 kernel: Failed to create system directory nfs4 May 13 00:45:03.734217 kernel: Failed to create system directory nfs4 May 13 00:45:03.734237 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.735699 kernel: Failed to create system directory nfs4 May 13 00:45:03.735775 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.737218 kernel: Failed to create system directory nfs4 May 13 00:45:03.737255 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.738744 kernel: Failed to create system directory nfs4 May 13 00:45:03.738780 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.740155 kernel: Failed to create system directory nfs4 May 13 00:45:03.740204 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.741723 kernel: Failed to create system directory nfs4 May 13 00:45:03.741750 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.743206 kernel: Failed to create system directory nfs4 May 13 00:45:03.743238 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.744676 kernel: Failed to create system directory nfs4 May 13 00:45:03.744734 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.746135 kernel: Failed to create system directory nfs4 May 13 00:45:03.746166 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.747650 kernel: Failed to create system directory nfs4 May 13 00:45:03.747686 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.749093 kernel: Failed to create system directory nfs4 May 13 00:45:03.749117 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.750568 kernel: Failed to create system directory nfs4 May 13 00:45:03.750586 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.750677 kubelet[1444]: E0513 00:45:03.750645 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.752022 kernel: Failed to create system directory nfs4 May 13 00:45:03.752055 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.754175 kernel: Failed to create system directory nfs4 May 13 00:45:03.754197 kernel: Failed to create system directory nfs4 May 13 00:45:03.754210 kernel: Failed to create system directory nfs4 May 13 00:45:03.672000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.888898 kernel: NFS: Registering the id_resolver key type May 13 00:45:03.888950 kernel: Key type id_resolver registered May 13 00:45:03.888975 kernel: Key type id_legacy registered May 13 00:45:03.672000 audit[2913]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9984206010 a1=209404 a2=56132aac52b0 a3=5 items=0 ppid=9 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.672000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.900922 kernel: Failed to create system directory rpcgss May 13 00:45:03.900961 kernel: Failed to create system directory rpcgss May 13 00:45:03.900977 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.903092 kernel: Failed to create system directory rpcgss May 13 00:45:03.903121 kernel: Failed to create system directory rpcgss May 13 00:45:03.903136 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.904573 kernel: Failed to create system directory rpcgss May 13 00:45:03.904600 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.906020 kernel: Failed to create system directory rpcgss May 13 00:45:03.906077 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.908224 kernel: Failed to create system directory rpcgss May 13 00:45:03.908247 kernel: Failed to create system directory rpcgss May 13 00:45:03.908268 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.909705 kernel: Failed to create system directory rpcgss May 13 00:45:03.909759 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.911191 kernel: Failed to create system directory rpcgss May 13 00:45:03.911223 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.912690 kernel: Failed to create system directory rpcgss May 13 00:45:03.912737 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.914174 kernel: Failed to create system directory rpcgss May 13 00:45:03.914203 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.915697 kernel: Failed to create system directory rpcgss May 13 00:45:03.915744 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.917207 kernel: Failed to create system directory rpcgss May 13 00:45:03.917244 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.895000 audit[2914]: AVC avc: denied { confidentiality } for pid=2914 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:03.918718 kernel: Failed to create system directory rpcgss May 13 00:45:03.895000 audit[2914]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fdc761c3010 a1=70b64 a2=5557b44d42b0 a3=5 items=0 ppid=9 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.895000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 13 00:45:03.929027 nfsidmap[2921]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:45:03.931304 nfsidmap[2924]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:45:03.939000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556ccbc98ce0 a2=10 a3=36643c854cc71522 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.939000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:45:03.939000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556ccbc98ce0 a2=10 a3=36643c854cc71522 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.939000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:45:03.939000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:45:03.939000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556ccbc98ce0 a2=10 a3=36643c854cc71522 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:03.939000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:45:04.098684 env[1197]: time="2025-05-13T00:45:04.098639883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ed24a034-1155-4741-a3e6-be669e20245f,Namespace:default,Attempt:0,}" May 13 00:45:04.193897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:45:04.194042 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 13 00:45:04.191478 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP May 13 00:45:04.193950 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.133 [INFO][2927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.85-k8s-test--pod--1-eth0 default ed24a034-1155-4741-a3e6-be669e20245f 1172 0 2025-05-13 00:44:48 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.85 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.134 [INFO][2927] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.156 [INFO][2942] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" HandleID="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Workload="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.163 [INFO][2942] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" HandleID="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Workload="10.0.0.85-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f8a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.85", "pod":"test-pod-1", "timestamp":"2025-05-13 00:45:04.156602771 +0000 UTC"}, Hostname:"10.0.0.85", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.163 [INFO][2942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.163 [INFO][2942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.163 [INFO][2942] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.85' May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.165 [INFO][2942] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.168 [INFO][2942] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.171 [INFO][2942] ipam/ipam.go 489: Trying affinity for 192.168.122.128/26 host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.172 [INFO][2942] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.174 [INFO][2942] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.128/26 host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.174 [INFO][2942] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.128/26 handle="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.175 [INFO][2942] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0 May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.184 [INFO][2942] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.128/26 handle="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.188 [INFO][2942] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.132/26] block=192.168.122.128/26 handle="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.188 [INFO][2942] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.132/26] handle="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" host="10.0.0.85" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.188 [INFO][2942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.188 [INFO][2942] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.132/26] IPv6=[] ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" HandleID="k8s-pod-network.6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Workload="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201204 env[1197]: 2025-05-13 00:45:04.189 [INFO][2927] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ed24a034-1155-4741-a3e6-be669e20245f", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:04.201924 env[1197]: 2025-05-13 00:45:04.189 [INFO][2927] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.132/32] ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201924 env[1197]: 2025-05-13 00:45:04.189 [INFO][2927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201924 env[1197]: 2025-05-13 00:45:04.194 [INFO][2927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.201924 env[1197]: 2025-05-13 00:45:04.194 [INFO][2927] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ed24a034-1155-4741-a3e6-be669e20245f", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"26:0b:eb:81:42:ed", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:04.201924 env[1197]: 2025-05-13 00:45:04.199 [INFO][2927] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.85-k8s-test--pod--1-eth0" May 13 00:45:04.207000 audit[2966]: NETFILTER_CFG table=filter:96 family=2 entries=34 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:04.207000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7fffe8c67140 a2=0 a3=7fffe8c6712c items=0 ppid=2150 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.207000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:04.210390 env[1197]: time="2025-05-13T00:45:04.210328073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:04.210390 env[1197]: time="2025-05-13T00:45:04.210375276Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:04.210483 env[1197]: time="2025-05-13T00:45:04.210386959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:04.210586 env[1197]: time="2025-05-13T00:45:04.210528757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0 pid=2972 runtime=io.containerd.runc.v2 May 13 00:45:04.220786 systemd[1]: Started cri-containerd-6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0.scope. May 13 00:45:04.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit: BPF prog-id=123 op=LOAD May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613537613435383663323230366266646137623632326464386333 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613537613435383663323230366266646137623632326464386333 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit: BPF prog-id=124 op=LOAD May 13 00:45:04.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cdce0 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613537613435383663323230366266646137623632326464386333 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit: BPF prog-id=125 op=LOAD May 13 00:45:04.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cdd28 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613537613435383663323230366266646137623632326464386333 May 13 00:45:04.228000 audit: BPF prog-id=125 op=UNLOAD May 13 00:45:04.228000 audit: BPF prog-id=124 op=UNLOAD May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.228000 audit: BPF prog-id=126 op=LOAD May 13 00:45:04.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0138 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613537613435383663323230366266646137623632326464386333 May 13 00:45:04.230969 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:45:04.253185 env[1197]: time="2025-05-13T00:45:04.253140196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ed24a034-1155-4741-a3e6-be669e20245f,Namespace:default,Attempt:0,} returns sandbox id \"6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0\"" May 13 00:45:04.254502 env[1197]: time="2025-05-13T00:45:04.254466365Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:45:04.618726 env[1197]: time="2025-05-13T00:45:04.618666744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:04.620433 env[1197]: time="2025-05-13T00:45:04.620396826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:04.622092 env[1197]: time="2025-05-13T00:45:04.622071338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:04.623423 env[1197]: time="2025-05-13T00:45:04.623403178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:04.624790 env[1197]: time="2025-05-13T00:45:04.624753164Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:45:04.626466 env[1197]: time="2025-05-13T00:45:04.626431684Z" level=info msg="CreateContainer within sandbox \"6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 13 00:45:04.638332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1591567149.mount: Deactivated successfully. May 13 00:45:04.639981 env[1197]: time="2025-05-13T00:45:04.639930121Z" level=info msg="CreateContainer within sandbox \"6ba57a4586c2206bfda7b622dd8c3bf2ee4b1c79bd84f63b04e48e1feeff31a0\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"10e501ca2c07a9f7d94dbec2fff0a3d09a6a59182f82efcff833c36c8efa637a\"" May 13 00:45:04.640452 env[1197]: time="2025-05-13T00:45:04.640432817Z" level=info msg="StartContainer for \"10e501ca2c07a9f7d94dbec2fff0a3d09a6a59182f82efcff833c36c8efa637a\"" May 13 00:45:04.655873 systemd[1]: Started cri-containerd-10e501ca2c07a9f7d94dbec2fff0a3d09a6a59182f82efcff833c36c8efa637a.scope. May 13 00:45:04.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.661000 audit: BPF prog-id=127 op=LOAD May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2972 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653530316361326330376139663764393464626563326666663061 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2972 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653530316361326330376139663764393464626563326666663061 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit: BPF prog-id=128 op=LOAD May 13 00:45:04.662000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098540 items=0 ppid=2972 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653530316361326330376139663764393464626563326666663061 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit: BPF prog-id=129 op=LOAD May 13 00:45:04.662000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098588 items=0 ppid=2972 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653530316361326330376139663764393464626563326666663061 May 13 00:45:04.662000 audit: BPF prog-id=129 op=UNLOAD May 13 00:45:04.662000 audit: BPF prog-id=128 op=UNLOAD May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:04.662000 audit: BPF prog-id=130 op=LOAD May 13 00:45:04.662000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098998 items=0 ppid=2972 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:04.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653530316361326330376139663764393464626563326666663061 May 13 00:45:04.674563 env[1197]: time="2025-05-13T00:45:04.674514336Z" level=info msg="StartContainer for \"10e501ca2c07a9f7d94dbec2fff0a3d09a6a59182f82efcff833c36c8efa637a\" returns successfully" May 13 00:45:04.751653 kubelet[1444]: E0513 00:45:04.751611 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:05.413380 kubelet[1444]: I0513 00:45:05.413333 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.042109688 podStartE2EDuration="17.413315678s" podCreationTimestamp="2025-05-13 00:44:48 +0000 UTC" firstStartedPulling="2025-05-13 00:45:04.254122661 +0000 UTC m=+55.860618466" lastFinishedPulling="2025-05-13 00:45:04.625328652 +0000 UTC m=+56.231824456" observedRunningTime="2025-05-13 00:45:05.413308804 +0000 UTC m=+57.019804608" watchObservedRunningTime="2025-05-13 00:45:05.413315678 +0000 UTC m=+57.019811482" May 13 00:45:05.422723 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL May 13 00:45:05.752243 kubelet[1444]: E0513 00:45:05.752116 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:06.752713 kubelet[1444]: E0513 00:45:06.752670 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:07.753067 kubelet[1444]: E0513 00:45:07.752999 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:08.702500 kubelet[1444]: E0513 00:45:08.702453 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:08.743858 env[1197]: time="2025-05-13T00:45:08.743822291Z" level=info msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" May 13 00:45:08.753712 kubelet[1444]: E0513 00:45:08.753671 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.770 [WARNING][3076] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"31a470c9-16ed-47fd-b1ab-563ff0b912d2", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2", Pod:"nginx-deployment-8587fbcb89-k76cd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic93ed407f03", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.771 [INFO][3076] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.771 [INFO][3076] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" iface="eth0" netns="" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.771 [INFO][3076] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.771 [INFO][3076] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.786 [INFO][3085] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.786 [INFO][3085] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.786 [INFO][3085] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.792 [WARNING][3085] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.792 [INFO][3085] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.793 [INFO][3085] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:08.795330 env[1197]: 2025-05-13 00:45:08.794 [INFO][3076] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.795992 env[1197]: time="2025-05-13T00:45:08.795943699Z" level=info msg="TearDown network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" successfully" May 13 00:45:08.796080 env[1197]: time="2025-05-13T00:45:08.796056178Z" level=info msg="StopPodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" returns successfully" May 13 00:45:08.796623 env[1197]: time="2025-05-13T00:45:08.796599146Z" level=info msg="RemovePodSandbox for \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" May 13 00:45:08.796668 env[1197]: time="2025-05-13T00:45:08.796624917Z" level=info msg="Forcibly stopping sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\"" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.823 [WARNING][3109] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"31a470c9-16ed-47fd-b1ab-563ff0b912d2", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"40a72e1482c7176d4ba1ceac7b328ae401b5ddb3b39dace7774d0bccf3a2c5e2", Pod:"nginx-deployment-8587fbcb89-k76cd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic93ed407f03", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.823 [INFO][3109] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.823 [INFO][3109] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" iface="eth0" netns="" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.823 [INFO][3109] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.823 [INFO][3109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.841 [INFO][3118] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.841 [INFO][3118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.841 [INFO][3118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.846 [WARNING][3118] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.846 [INFO][3118] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" HandleID="k8s-pod-network.dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" Workload="10.0.0.85-k8s-nginx--deployment--8587fbcb89--k76cd-eth0" May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.847 [INFO][3118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:08.849130 env[1197]: 2025-05-13 00:45:08.847 [INFO][3109] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7" May 13 00:45:08.849601 env[1197]: time="2025-05-13T00:45:08.849154951Z" level=info msg="TearDown network for sandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" successfully" May 13 00:45:08.852073 env[1197]: time="2025-05-13T00:45:08.852049354Z" level=info msg="RemovePodSandbox \"dd1391d148014ca1365eb14e407dfb31e2a633928de322d09cead51e6ef10ca7\" returns successfully" May 13 00:45:08.852594 env[1197]: time="2025-05-13T00:45:08.852572744Z" level=info msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.881 [WARNING][3140] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-csi--node--driver--wvf9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52", Pod:"csi-node-driver-wvf9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali651fff514ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.882 [INFO][3140] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.882 [INFO][3140] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" iface="eth0" netns="" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.882 [INFO][3140] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.882 [INFO][3140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.897 [INFO][3148] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.897 [INFO][3148] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.897 [INFO][3148] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.902 [WARNING][3148] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.902 [INFO][3148] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.903 [INFO][3148] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:08.905321 env[1197]: 2025-05-13 00:45:08.904 [INFO][3140] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.905881 env[1197]: time="2025-05-13T00:45:08.905313939Z" level=info msg="TearDown network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" successfully" May 13 00:45:08.905881 env[1197]: time="2025-05-13T00:45:08.905364017Z" level=info msg="StopPodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" returns successfully" May 13 00:45:08.905946 env[1197]: time="2025-05-13T00:45:08.905914890Z" level=info msg="RemovePodSandbox for \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" May 13 00:45:08.906007 env[1197]: time="2025-05-13T00:45:08.905957063Z" level=info msg="Forcibly stopping sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\"" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.932 [WARNING][3170] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.85-k8s-csi--node--driver--wvf9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b0b1d6b-0aa7-43d2-8772-f03ed0e0a42c", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 44, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.85", ContainerID:"8b629e786ef6b6953eac5494b2d01223cccf75c0af238e57d625a9eca8909e52", Pod:"csi-node-driver-wvf9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali651fff514ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.932 [INFO][3170] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.932 [INFO][3170] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" iface="eth0" netns="" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.932 [INFO][3170] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.932 [INFO][3170] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.949 [INFO][3178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.949 [INFO][3178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.949 [INFO][3178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.953 [WARNING][3178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.953 [INFO][3178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" HandleID="k8s-pod-network.ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" Workload="10.0.0.85-k8s-csi--node--driver--wvf9j-eth0" May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.954 [INFO][3178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:08.957688 env[1197]: 2025-05-13 00:45:08.956 [INFO][3170] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b" May 13 00:45:08.957688 env[1197]: time="2025-05-13T00:45:08.957614696Z" level=info msg="TearDown network for sandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" successfully" May 13 00:45:08.961071 env[1197]: time="2025-05-13T00:45:08.961034814Z" level=info msg="RemovePodSandbox \"ed16807732311b73a8e97e919af36def1d07059dceacd37517e7c70b2c6e773b\" returns successfully" May 13 00:45:09.754165 kubelet[1444]: E0513 00:45:09.754118 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:10.755288 kubelet[1444]: E0513 00:45:10.755234 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:45:11.755774 kubelet[1444]: E0513 00:45:11.755728 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"