May 13 00:40:26.746438 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 13 00:40:26.746459 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon May 12 23:22:00 -00 2025 May 13 00:40:26.746469 kernel: efi: EFI v2.70 by EDK II May 13 00:40:26.746475 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 13 00:40:26.746480 kernel: random: crng init done May 13 00:40:26.746486 kernel: ACPI: Early table checksum verification disabled May 13 00:40:26.746495 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 13 00:40:26.746502 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 13 00:40:26.746507 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746512 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746518 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746525 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746530 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746536 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746544 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746552 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746558 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:40:26.746563 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 13 00:40:26.746569 kernel: NUMA: Failed to initialise from firmware May 13 00:40:26.746575 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:40:26.746580 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 13 00:40:26.746588 kernel: Zone ranges: May 13 00:40:26.746594 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:40:26.746601 kernel: DMA32 empty May 13 00:40:26.746606 kernel: Normal empty May 13 00:40:26.746612 kernel: Movable zone start for each node May 13 00:40:26.746618 kernel: Early memory node ranges May 13 00:40:26.746625 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 13 00:40:26.746631 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 13 00:40:26.746637 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 13 00:40:26.746643 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 13 00:40:26.746648 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 13 00:40:26.746654 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 13 00:40:26.746662 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 13 00:40:26.746671 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 13 00:40:26.746678 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 13 00:40:26.746684 kernel: psci: probing for conduit method from ACPI. May 13 00:40:26.746692 kernel: psci: PSCIv1.1 detected in firmware. May 13 00:40:26.746698 kernel: psci: Using standard PSCI v0.2 function IDs May 13 00:40:26.746704 kernel: psci: Trusted OS migration not required May 13 00:40:26.746714 kernel: psci: SMC Calling Convention v1.1 May 13 00:40:26.746721 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 13 00:40:26.746729 kernel: ACPI: SRAT not present May 13 00:40:26.746735 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 13 00:40:26.746743 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 13 00:40:26.746750 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 13 00:40:26.746756 kernel: Detected PIPT I-cache on CPU0 May 13 00:40:26.746762 kernel: CPU features: detected: GIC system register CPU interface May 13 00:40:26.746768 kernel: CPU features: detected: Hardware dirty bit management May 13 00:40:26.746774 kernel: CPU features: detected: Spectre-v4 May 13 00:40:26.746780 kernel: CPU features: detected: Spectre-BHB May 13 00:40:26.746787 kernel: CPU features: kernel page table isolation forced ON by KASLR May 13 00:40:26.746793 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 13 00:40:26.746799 kernel: CPU features: detected: ARM erratum 1418040 May 13 00:40:26.746805 kernel: CPU features: detected: SSBS not fully self-synchronizing May 13 00:40:26.746811 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 13 00:40:26.746817 kernel: Policy zone: DMA May 13 00:40:26.746824 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:40:26.746830 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:40:26.746836 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:40:26.746842 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:40:26.746849 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:40:26.746857 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 13 00:40:26.746863 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:40:26.746869 kernel: trace event string verifier disabled May 13 00:40:26.746876 kernel: rcu: Preemptible hierarchical RCU implementation. May 13 00:40:26.746882 kernel: rcu: RCU event tracing is enabled. May 13 00:40:26.746888 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:40:26.746894 kernel: Trampoline variant of Tasks RCU enabled. May 13 00:40:26.746900 kernel: Tracing variant of Tasks RCU enabled. May 13 00:40:26.746906 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:40:26.746913 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:40:26.746919 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 13 00:40:26.746926 kernel: GICv3: 256 SPIs implemented May 13 00:40:26.746932 kernel: GICv3: 0 Extended SPIs implemented May 13 00:40:26.746938 kernel: GICv3: Distributor has no Range Selector support May 13 00:40:26.746944 kernel: Root IRQ handler: gic_handle_irq May 13 00:40:26.746950 kernel: GICv3: 16 PPIs implemented May 13 00:40:26.746956 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 13 00:40:26.746962 kernel: ACPI: SRAT not present May 13 00:40:26.746968 kernel: ITS [mem 0x08080000-0x0809ffff] May 13 00:40:26.746974 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 13 00:40:26.746980 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 13 00:40:26.746986 kernel: GICv3: using LPI property table @0x00000000400d0000 May 13 00:40:26.746992 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 13 00:40:26.747000 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:40:26.747006 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 13 00:40:26.747012 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 13 00:40:26.747018 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 13 00:40:26.747024 kernel: arm-pv: using stolen time PV May 13 00:40:26.747031 kernel: Console: colour dummy device 80x25 May 13 00:40:26.747037 kernel: ACPI: Core revision 20210730 May 13 00:40:26.747043 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 13 00:40:26.747050 kernel: pid_max: default: 32768 minimum: 301 May 13 00:40:26.747056 kernel: LSM: Security Framework initializing May 13 00:40:26.747063 kernel: SELinux: Initializing. May 13 00:40:26.747080 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:40:26.747105 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:40:26.747112 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 13 00:40:26.747118 kernel: rcu: Hierarchical SRCU implementation. May 13 00:40:26.747125 kernel: Platform MSI: ITS@0x8080000 domain created May 13 00:40:26.747131 kernel: PCI/MSI: ITS@0x8080000 domain created May 13 00:40:26.747137 kernel: Remapping and enabling EFI services. May 13 00:40:26.747143 kernel: smp: Bringing up secondary CPUs ... May 13 00:40:26.747151 kernel: Detected PIPT I-cache on CPU1 May 13 00:40:26.747158 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 13 00:40:26.747164 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 13 00:40:26.747171 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:40:26.747177 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 13 00:40:26.747183 kernel: Detected PIPT I-cache on CPU2 May 13 00:40:26.747190 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 13 00:40:26.747196 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 13 00:40:26.747208 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:40:26.747214 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 13 00:40:26.747222 kernel: Detected PIPT I-cache on CPU3 May 13 00:40:26.747231 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 13 00:40:26.747238 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 13 00:40:26.747244 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 13 00:40:26.747258 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 13 00:40:26.747266 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:40:26.747273 kernel: SMP: Total of 4 processors activated. May 13 00:40:26.747279 kernel: CPU features: detected: 32-bit EL0 Support May 13 00:40:26.747286 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 13 00:40:26.747293 kernel: CPU features: detected: Common not Private translations May 13 00:40:26.747299 kernel: CPU features: detected: CRC32 instructions May 13 00:40:26.747306 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 13 00:40:26.747313 kernel: CPU features: detected: LSE atomic instructions May 13 00:40:26.747320 kernel: CPU features: detected: Privileged Access Never May 13 00:40:26.747327 kernel: CPU features: detected: RAS Extension Support May 13 00:40:26.747333 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 13 00:40:26.747340 kernel: CPU: All CPU(s) started at EL1 May 13 00:40:26.747347 kernel: alternatives: patching kernel code May 13 00:40:26.747354 kernel: devtmpfs: initialized May 13 00:40:26.747360 kernel: KASLR enabled May 13 00:40:26.747367 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:40:26.747374 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:40:26.747380 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:40:26.747387 kernel: SMBIOS 3.0.0 present. May 13 00:40:26.747393 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 13 00:40:26.747400 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:40:26.747408 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 13 00:40:26.747415 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 13 00:40:26.747421 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 13 00:40:26.747428 kernel: audit: initializing netlink subsys (disabled) May 13 00:40:26.747437 kernel: audit: type=2000 audit(0.040:1): state=initialized audit_enabled=0 res=1 May 13 00:40:26.747444 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:40:26.747451 kernel: cpuidle: using governor menu May 13 00:40:26.747457 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 13 00:40:26.747464 kernel: ASID allocator initialised with 32768 entries May 13 00:40:26.747472 kernel: ACPI: bus type PCI registered May 13 00:40:26.747478 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:40:26.747485 kernel: Serial: AMBA PL011 UART driver May 13 00:40:26.747491 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:40:26.747498 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 13 00:40:26.747504 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:40:26.747511 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 13 00:40:26.747518 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:40:26.747524 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 13 00:40:26.747532 kernel: ACPI: Added _OSI(Module Device) May 13 00:40:26.747539 kernel: ACPI: Added _OSI(Processor Device) May 13 00:40:26.747545 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:40:26.747551 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:40:26.747558 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:40:26.747565 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:40:26.747571 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:40:26.747578 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:40:26.747584 kernel: ACPI: Interpreter enabled May 13 00:40:26.748653 kernel: ACPI: Using GIC for interrupt routing May 13 00:40:26.748677 kernel: ACPI: MCFG table detected, 1 entries May 13 00:40:26.748684 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 13 00:40:26.748691 kernel: printk: console [ttyAMA0] enabled May 13 00:40:26.748698 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:40:26.748835 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:40:26.748901 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 13 00:40:26.748964 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 13 00:40:26.749022 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 13 00:40:26.749102 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 13 00:40:26.749112 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 13 00:40:26.749119 kernel: PCI host bridge to bus 0000:00 May 13 00:40:26.749189 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 13 00:40:26.749254 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 13 00:40:26.749309 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 13 00:40:26.749364 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:40:26.749438 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 13 00:40:26.749514 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:40:26.749576 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 13 00:40:26.749636 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 13 00:40:26.749695 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:40:26.749758 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 13 00:40:26.749820 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 13 00:40:26.749880 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 13 00:40:26.749936 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 13 00:40:26.749989 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 13 00:40:26.750041 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 13 00:40:26.750050 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 13 00:40:26.750057 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 13 00:40:26.750124 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 13 00:40:26.750136 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 13 00:40:26.750143 kernel: iommu: Default domain type: Translated May 13 00:40:26.750150 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 13 00:40:26.750157 kernel: vgaarb: loaded May 13 00:40:26.750164 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:40:26.750171 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:40:26.750177 kernel: PTP clock support registered May 13 00:40:26.750184 kernel: Registered efivars operations May 13 00:40:26.750194 kernel: clocksource: Switched to clocksource arch_sys_counter May 13 00:40:26.750200 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:40:26.750215 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:40:26.750223 kernel: pnp: PnP ACPI init May 13 00:40:26.750306 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 13 00:40:26.750317 kernel: pnp: PnP ACPI: found 1 devices May 13 00:40:26.750323 kernel: NET: Registered PF_INET protocol family May 13 00:40:26.750330 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:40:26.750340 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:40:26.750346 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:40:26.750353 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:40:26.750360 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:40:26.750367 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:40:26.750374 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:40:26.750381 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:40:26.750388 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:40:26.750394 kernel: PCI: CLS 0 bytes, default 64 May 13 00:40:26.750403 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 13 00:40:26.750410 kernel: kvm [1]: HYP mode not available May 13 00:40:26.750416 kernel: Initialise system trusted keyrings May 13 00:40:26.750423 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:40:26.750430 kernel: Key type asymmetric registered May 13 00:40:26.750436 kernel: Asymmetric key parser 'x509' registered May 13 00:40:26.750443 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:40:26.750450 kernel: io scheduler mq-deadline registered May 13 00:40:26.750456 kernel: io scheduler kyber registered May 13 00:40:26.750464 kernel: io scheduler bfq registered May 13 00:40:26.750471 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 13 00:40:26.750477 kernel: ACPI: button: Power Button [PWRB] May 13 00:40:26.750485 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 13 00:40:26.750585 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 13 00:40:26.750597 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:40:26.750604 kernel: thunder_xcv, ver 1.0 May 13 00:40:26.750610 kernel: thunder_bgx, ver 1.0 May 13 00:40:26.750617 kernel: nicpf, ver 1.0 May 13 00:40:26.750626 kernel: nicvf, ver 1.0 May 13 00:40:26.750698 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 13 00:40:26.750752 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-13T00:40:26 UTC (1747096826) May 13 00:40:26.750761 kernel: hid: raw HID events driver (C) Jiri Kosina May 13 00:40:26.750768 kernel: NET: Registered PF_INET6 protocol family May 13 00:40:26.750775 kernel: Segment Routing with IPv6 May 13 00:40:26.750782 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:40:26.750788 kernel: NET: Registered PF_PACKET protocol family May 13 00:40:26.750797 kernel: Key type dns_resolver registered May 13 00:40:26.750804 kernel: registered taskstats version 1 May 13 00:40:26.750810 kernel: Loading compiled-in X.509 certificates May 13 00:40:26.750817 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: d291b704d59536a3c0ba96fd6f5a99459de8de99' May 13 00:40:26.750824 kernel: Key type .fscrypt registered May 13 00:40:26.750830 kernel: Key type fscrypt-provisioning registered May 13 00:40:26.750837 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:40:26.750844 kernel: ima: Allocated hash algorithm: sha1 May 13 00:40:26.750850 kernel: ima: No architecture policies found May 13 00:40:26.750859 kernel: clk: Disabling unused clocks May 13 00:40:26.750866 kernel: Freeing unused kernel memory: 36480K May 13 00:40:26.750873 kernel: Run /init as init process May 13 00:40:26.750879 kernel: with arguments: May 13 00:40:26.750886 kernel: /init May 13 00:40:26.750893 kernel: with environment: May 13 00:40:26.750899 kernel: HOME=/ May 13 00:40:26.750906 kernel: TERM=linux May 13 00:40:26.750913 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:40:26.750923 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:40:26.750932 systemd[1]: Detected virtualization kvm. May 13 00:40:26.750939 systemd[1]: Detected architecture arm64. May 13 00:40:26.750946 systemd[1]: Running in initrd. May 13 00:40:26.750954 systemd[1]: No hostname configured, using default hostname. May 13 00:40:26.750961 systemd[1]: Hostname set to . May 13 00:40:26.750968 systemd[1]: Initializing machine ID from VM UUID. May 13 00:40:26.750977 systemd[1]: Queued start job for default target initrd.target. May 13 00:40:26.750984 systemd[1]: Started systemd-ask-password-console.path. May 13 00:40:26.750991 systemd[1]: Reached target cryptsetup.target. May 13 00:40:26.750998 systemd[1]: Reached target paths.target. May 13 00:40:26.751005 systemd[1]: Reached target slices.target. May 13 00:40:26.751013 systemd[1]: Reached target swap.target. May 13 00:40:26.751020 systemd[1]: Reached target timers.target. May 13 00:40:26.751027 systemd[1]: Listening on iscsid.socket. May 13 00:40:26.751035 systemd[1]: Listening on iscsiuio.socket. May 13 00:40:26.751043 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:40:26.751050 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:40:26.751057 systemd[1]: Listening on systemd-journald.socket. May 13 00:40:26.751064 systemd[1]: Listening on systemd-networkd.socket. May 13 00:40:26.751084 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:40:26.751091 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:40:26.751099 systemd[1]: Reached target sockets.target. May 13 00:40:26.751108 systemd[1]: Starting kmod-static-nodes.service... May 13 00:40:26.751115 systemd[1]: Finished network-cleanup.service. May 13 00:40:26.751122 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:40:26.751129 systemd[1]: Starting systemd-journald.service... May 13 00:40:26.751136 systemd[1]: Starting systemd-modules-load.service... May 13 00:40:26.751143 systemd[1]: Starting systemd-resolved.service... May 13 00:40:26.751150 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:40:26.751157 systemd[1]: Finished kmod-static-nodes.service. May 13 00:40:26.751165 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:40:26.751173 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:40:26.751180 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:40:26.751188 kernel: audit: type=1130 audit(1747096826.749:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.751195 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:40:26.751213 systemd-journald[290]: Journal started May 13 00:40:26.751260 systemd-journald[290]: Runtime Journal (/run/log/journal/89a5bef858794d03ad4d22cdb76bedb1) is 6.0M, max 48.7M, 42.6M free. May 13 00:40:26.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.743352 systemd-modules-load[291]: Inserted module 'overlay' May 13 00:40:26.760214 systemd[1]: Started systemd-journald.service. May 13 00:40:26.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.760719 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:40:26.769384 kernel: audit: type=1130 audit(1747096826.760:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.769410 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:40:26.769424 kernel: audit: type=1130 audit(1747096826.765:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.769434 kernel: Bridge firewalling registered May 13 00:40:26.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.769003 systemd-resolved[292]: Positive Trust Anchors: May 13 00:40:26.769012 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:40:26.769039 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:40:26.769319 systemd-modules-load[291]: Inserted module 'br_netfilter' May 13 00:40:26.773350 systemd-resolved[292]: Defaulting to hostname 'linux'. May 13 00:40:26.777003 systemd[1]: Started systemd-resolved.service. May 13 00:40:26.783483 kernel: audit: type=1130 audit(1747096826.778:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.783508 kernel: SCSI subsystem initialized May 13 00:40:26.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.778643 systemd[1]: Reached target nss-lookup.target. May 13 00:40:26.784678 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:40:26.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.788598 systemd[1]: Starting dracut-cmdline.service... May 13 00:40:26.792132 kernel: audit: type=1130 audit(1747096826.785:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.792165 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:40:26.792184 kernel: device-mapper: uevent: version 1.0.3 May 13 00:40:26.796086 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:40:26.797608 systemd-modules-load[291]: Inserted module 'dm_multipath' May 13 00:40:26.798569 dracut-cmdline[307]: dracut-dracut-053 May 13 00:40:26.799344 systemd[1]: Finished systemd-modules-load.service. May 13 00:40:26.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.801102 systemd[1]: Starting systemd-sysctl.service... May 13 00:40:26.804655 kernel: audit: type=1130 audit(1747096826.800:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.804767 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ae60136413c5686d5b1e9c38408a367f831e354d706496e9f743f02289aad53d May 13 00:40:26.810525 systemd[1]: Finished systemd-sysctl.service. May 13 00:40:26.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.815099 kernel: audit: type=1130 audit(1747096826.811:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.867099 kernel: Loading iSCSI transport class v2.0-870. May 13 00:40:26.882098 kernel: iscsi: registered transport (tcp) May 13 00:40:26.897092 kernel: iscsi: registered transport (qla4xxx) May 13 00:40:26.897104 kernel: QLogic iSCSI HBA Driver May 13 00:40:26.933150 systemd[1]: Finished dracut-cmdline.service. May 13 00:40:26.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.934985 systemd[1]: Starting dracut-pre-udev.service... May 13 00:40:26.938320 kernel: audit: type=1130 audit(1747096826.933:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:26.981093 kernel: raid6: neonx8 gen() 13738 MB/s May 13 00:40:26.997093 kernel: raid6: neonx8 xor() 10773 MB/s May 13 00:40:27.015092 kernel: raid6: neonx4 gen() 13495 MB/s May 13 00:40:27.031093 kernel: raid6: neonx4 xor() 11118 MB/s May 13 00:40:27.048092 kernel: raid6: neonx2 gen() 12937 MB/s May 13 00:40:27.065095 kernel: raid6: neonx2 xor() 10637 MB/s May 13 00:40:27.082092 kernel: raid6: neonx1 gen() 10592 MB/s May 13 00:40:27.099096 kernel: raid6: neonx1 xor() 8783 MB/s May 13 00:40:27.116092 kernel: raid6: int64x8 gen() 6263 MB/s May 13 00:40:27.133093 kernel: raid6: int64x8 xor() 3538 MB/s May 13 00:40:27.150100 kernel: raid6: int64x4 gen() 7205 MB/s May 13 00:40:27.167094 kernel: raid6: int64x4 xor() 3849 MB/s May 13 00:40:27.184093 kernel: raid6: int64x2 gen() 6147 MB/s May 13 00:40:27.201097 kernel: raid6: int64x2 xor() 3319 MB/s May 13 00:40:27.218095 kernel: raid6: int64x1 gen() 5040 MB/s May 13 00:40:27.235184 kernel: raid6: int64x1 xor() 2641 MB/s May 13 00:40:27.235195 kernel: raid6: using algorithm neonx8 gen() 13738 MB/s May 13 00:40:27.235210 kernel: raid6: .... xor() 10773 MB/s, rmw enabled May 13 00:40:27.236281 kernel: raid6: using neon recovery algorithm May 13 00:40:27.247091 kernel: xor: measuring software checksum speed May 13 00:40:27.247106 kernel: 8regs : 17206 MB/sec May 13 00:40:27.248252 kernel: 32regs : 18308 MB/sec May 13 00:40:27.248266 kernel: arm64_neon : 27542 MB/sec May 13 00:40:27.248275 kernel: xor: using function: arm64_neon (27542 MB/sec) May 13 00:40:27.304090 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 13 00:40:27.314378 systemd[1]: Finished dracut-pre-udev.service. May 13 00:40:27.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:27.316376 systemd[1]: Starting systemd-udevd.service... May 13 00:40:27.319807 kernel: audit: type=1130 audit(1747096827.315:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:27.315000 audit: BPF prog-id=7 op=LOAD May 13 00:40:27.315000 audit: BPF prog-id=8 op=LOAD May 13 00:40:27.332226 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 13 00:40:27.335594 systemd[1]: Started systemd-udevd.service. May 13 00:40:27.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:27.337355 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:40:27.350564 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation May 13 00:40:27.379417 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:40:27.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:27.381284 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:40:27.420733 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:40:27.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:27.450278 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:40:27.455595 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:40:27.455611 kernel: GPT:9289727 != 19775487 May 13 00:40:27.455619 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:40:27.455627 kernel: GPT:9289727 != 19775487 May 13 00:40:27.455636 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:40:27.455650 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:40:27.470098 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (544) May 13 00:40:27.472166 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:40:27.475106 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:40:27.476234 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:40:27.480956 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:40:27.486409 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:40:27.488232 systemd[1]: Starting disk-uuid.service... May 13 00:40:27.494559 disk-uuid[562]: Primary Header is updated. May 13 00:40:27.494559 disk-uuid[562]: Secondary Entries is updated. May 13 00:40:27.494559 disk-uuid[562]: Secondary Header is updated. May 13 00:40:27.498083 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:40:28.507842 disk-uuid[563]: The operation has completed successfully. May 13 00:40:28.509050 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:40:28.534293 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:40:28.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.534400 systemd[1]: Finished disk-uuid.service. May 13 00:40:28.536166 systemd[1]: Starting verity-setup.service... May 13 00:40:28.555290 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 13 00:40:28.575806 systemd[1]: Found device dev-mapper-usr.device. May 13 00:40:28.578297 systemd[1]: Mounting sysusr-usr.mount... May 13 00:40:28.580493 systemd[1]: Finished verity-setup.service. May 13 00:40:28.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.631085 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:40:28.631465 systemd[1]: Mounted sysusr-usr.mount. May 13 00:40:28.632368 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:40:28.633170 systemd[1]: Starting ignition-setup.service... May 13 00:40:28.635512 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:40:28.642205 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:40:28.642256 kernel: BTRFS info (device vda6): using free space tree May 13 00:40:28.642266 kernel: BTRFS info (device vda6): has skinny extents May 13 00:40:28.651278 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:40:28.657456 systemd[1]: Finished ignition-setup.service. May 13 00:40:28.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.659246 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:40:28.732531 ignition[641]: Ignition 2.14.0 May 13 00:40:28.732542 ignition[641]: Stage: fetch-offline May 13 00:40:28.732581 ignition[641]: no configs at "/usr/lib/ignition/base.d" May 13 00:40:28.732591 ignition[641]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:28.732728 ignition[641]: parsed url from cmdline: "" May 13 00:40:28.732732 ignition[641]: no config URL provided May 13 00:40:28.732736 ignition[641]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:40:28.732743 ignition[641]: no config at "/usr/lib/ignition/user.ign" May 13 00:40:28.732761 ignition[641]: op(1): [started] loading QEMU firmware config module May 13 00:40:28.732765 ignition[641]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:40:28.739753 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:40:28.736147 ignition[641]: op(1): [finished] loading QEMU firmware config module May 13 00:40:28.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.741000 audit: BPF prog-id=9 op=LOAD May 13 00:40:28.742502 systemd[1]: Starting systemd-networkd.service... May 13 00:40:28.747318 ignition[641]: parsing config with SHA512: d9614eebe4510411b69ea180623daeace416463ff215ddf8770e760e5fa776823dc274f3f8e3901d7a7aaf972d94ad9748266fa796da95fea28f35cfd0e5aed0 May 13 00:40:28.752421 unknown[641]: fetched base config from "system" May 13 00:40:28.752438 unknown[641]: fetched user config from "qemu" May 13 00:40:28.752790 ignition[641]: fetch-offline: fetch-offline passed May 13 00:40:28.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.754097 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:40:28.752852 ignition[641]: Ignition finished successfully May 13 00:40:28.765758 systemd-networkd[739]: lo: Link UP May 13 00:40:28.765773 systemd-networkd[739]: lo: Gained carrier May 13 00:40:28.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.766171 systemd-networkd[739]: Enumeration completed May 13 00:40:28.766242 systemd[1]: Started systemd-networkd.service. May 13 00:40:28.766372 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:40:28.767467 systemd-networkd[739]: eth0: Link UP May 13 00:40:28.767471 systemd-networkd[739]: eth0: Gained carrier May 13 00:40:28.767588 systemd[1]: Reached target network.target. May 13 00:40:28.768874 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:40:28.769743 systemd[1]: Starting ignition-kargs.service... May 13 00:40:28.771785 systemd[1]: Starting iscsiuio.service... May 13 00:40:28.779480 ignition[741]: Ignition 2.14.0 May 13 00:40:28.779498 ignition[741]: Stage: kargs May 13 00:40:28.779617 ignition[741]: no configs at "/usr/lib/ignition/base.d" May 13 00:40:28.779627 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:28.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.780813 systemd[1]: Started iscsiuio.service. May 13 00:40:28.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.780333 ignition[741]: kargs: kargs passed May 13 00:40:28.782805 systemd[1]: Finished ignition-kargs.service. May 13 00:40:28.780384 ignition[741]: Ignition finished successfully May 13 00:40:28.785178 systemd[1]: Starting ignition-disks.service... May 13 00:40:28.786893 systemd[1]: Starting iscsid.service... May 13 00:40:28.788437 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.138/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:40:28.791108 iscsid[751]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:40:28.791108 iscsid[751]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:40:28.791108 iscsid[751]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:40:28.791108 iscsid[751]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:40:28.791108 iscsid[751]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:40:28.791108 iscsid[751]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:40:28.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.792637 ignition[750]: Ignition 2.14.0 May 13 00:40:28.793453 systemd[1]: Started iscsid.service. May 13 00:40:28.792644 ignition[750]: Stage: disks May 13 00:40:28.798974 systemd[1]: Starting dracut-initqueue.service... May 13 00:40:28.792750 ignition[750]: no configs at "/usr/lib/ignition/base.d" May 13 00:40:28.800856 systemd[1]: Finished ignition-disks.service. May 13 00:40:28.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.792760 ignition[750]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:28.802697 systemd[1]: Reached target initrd-root-device.target. May 13 00:40:28.793516 ignition[750]: disks: disks passed May 13 00:40:28.804493 systemd[1]: Reached target local-fs-pre.target. May 13 00:40:28.793561 ignition[750]: Ignition finished successfully May 13 00:40:28.805772 systemd[1]: Reached target local-fs.target. May 13 00:40:28.806997 systemd[1]: Reached target sysinit.target. May 13 00:40:28.808169 systemd[1]: Reached target basic.target. May 13 00:40:28.809860 systemd[1]: Finished dracut-initqueue.service. May 13 00:40:28.811052 systemd[1]: Reached target remote-fs-pre.target. May 13 00:40:28.812386 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:40:28.814056 systemd[1]: Reached target remote-fs.target. May 13 00:40:28.816351 systemd[1]: Starting dracut-pre-mount.service... May 13 00:40:28.824327 systemd[1]: Finished dracut-pre-mount.service. May 13 00:40:28.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.826059 systemd[1]: Starting systemd-fsck-root.service... May 13 00:40:28.837553 systemd-fsck[772]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 13 00:40:28.842220 systemd[1]: Finished systemd-fsck-root.service. May 13 00:40:28.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.844126 systemd[1]: Mounting sysroot.mount... May 13 00:40:28.851105 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:40:28.851704 systemd[1]: Mounted sysroot.mount. May 13 00:40:28.853222 systemd[1]: Reached target initrd-root-fs.target. May 13 00:40:28.855971 systemd[1]: Mounting sysroot-usr.mount... May 13 00:40:28.857806 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:40:28.859218 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:40:28.859275 systemd[1]: Reached target ignition-diskful.target. May 13 00:40:28.862466 systemd[1]: Mounted sysroot-usr.mount. May 13 00:40:28.864020 systemd[1]: Starting initrd-setup-root.service... May 13 00:40:28.868543 initrd-setup-root[782]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:40:28.872378 initrd-setup-root[790]: cut: /sysroot/etc/group: No such file or directory May 13 00:40:28.876625 initrd-setup-root[798]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:40:28.879938 initrd-setup-root[806]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:40:28.909116 systemd[1]: Finished initrd-setup-root.service. May 13 00:40:28.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.910798 systemd[1]: Starting ignition-mount.service... May 13 00:40:28.912261 systemd[1]: Starting sysroot-boot.service... May 13 00:40:28.916878 bash[823]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:40:28.930032 ignition[825]: INFO : Ignition 2.14.0 May 13 00:40:28.930032 ignition[825]: INFO : Stage: mount May 13 00:40:28.931674 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:40:28.931674 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:28.931674 ignition[825]: INFO : mount: mount passed May 13 00:40:28.931674 ignition[825]: INFO : Ignition finished successfully May 13 00:40:28.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.931718 systemd[1]: Finished ignition-mount.service. May 13 00:40:28.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:28.936313 systemd[1]: Finished sysroot-boot.service. May 13 00:40:29.589127 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:40:29.595098 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (833) May 13 00:40:29.597288 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 13 00:40:29.597305 kernel: BTRFS info (device vda6): using free space tree May 13 00:40:29.597314 kernel: BTRFS info (device vda6): has skinny extents May 13 00:40:29.600909 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:40:29.602648 systemd[1]: Starting ignition-files.service... May 13 00:40:29.617534 ignition[853]: INFO : Ignition 2.14.0 May 13 00:40:29.617534 ignition[853]: INFO : Stage: files May 13 00:40:29.619312 ignition[853]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:40:29.619312 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:29.619312 ignition[853]: DEBUG : files: compiled without relabeling support, skipping May 13 00:40:29.622850 ignition[853]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:40:29.622850 ignition[853]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:40:29.625694 ignition[853]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:40:29.625694 ignition[853]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:40:29.625694 ignition[853]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:40:29.625694 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 13 00:40:29.623789 unknown[853]: wrote ssh authorized keys file for user: core May 13 00:40:29.908917 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 13 00:40:30.128179 systemd-networkd[739]: eth0: Gained IPv6LL May 13 00:40:30.370717 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 13 00:40:30.370717 ignition[853]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 13 00:40:30.374742 ignition[853]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:40:30.374742 ignition[853]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:40:30.374742 ignition[853]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 13 00:40:30.374742 ignition[853]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:40:30.374742 ignition[853]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:40:30.406228 ignition[853]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:40:30.408636 ignition[853]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:40:30.408636 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:40:30.408636 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:40:30.408636 ignition[853]: INFO : files: files passed May 13 00:40:30.408636 ignition[853]: INFO : Ignition finished successfully May 13 00:40:30.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.408802 systemd[1]: Finished ignition-files.service. May 13 00:40:30.411763 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:40:30.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.413321 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:40:30.421766 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:40:30.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.413939 systemd[1]: Starting ignition-quench.service... May 13 00:40:30.425487 initrd-setup-root-after-ignition[880]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:40:30.417462 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:40:30.417547 systemd[1]: Finished ignition-quench.service. May 13 00:40:30.419944 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:40:30.422708 systemd[1]: Reached target ignition-complete.target. May 13 00:40:30.425419 systemd[1]: Starting initrd-parse-etc.service... May 13 00:40:30.437478 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:40:30.437568 systemd[1]: Finished initrd-parse-etc.service. May 13 00:40:30.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.439241 systemd[1]: Reached target initrd-fs.target. May 13 00:40:30.440552 systemd[1]: Reached target initrd.target. May 13 00:40:30.441881 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:40:30.442566 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:40:30.452935 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:40:30.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.454494 systemd[1]: Starting initrd-cleanup.service... May 13 00:40:30.462350 systemd[1]: Stopped target nss-lookup.target. May 13 00:40:30.463296 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:40:30.464775 systemd[1]: Stopped target timers.target. May 13 00:40:30.466143 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:40:30.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.466266 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:40:30.467569 systemd[1]: Stopped target initrd.target. May 13 00:40:30.469007 systemd[1]: Stopped target basic.target. May 13 00:40:30.470398 systemd[1]: Stopped target ignition-complete.target. May 13 00:40:30.471871 systemd[1]: Stopped target ignition-diskful.target. May 13 00:40:30.473204 systemd[1]: Stopped target initrd-root-device.target. May 13 00:40:30.474698 systemd[1]: Stopped target remote-fs.target. May 13 00:40:30.476100 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:40:30.477562 systemd[1]: Stopped target sysinit.target. May 13 00:40:30.478889 systemd[1]: Stopped target local-fs.target. May 13 00:40:30.480318 systemd[1]: Stopped target local-fs-pre.target. May 13 00:40:30.481632 systemd[1]: Stopped target swap.target. May 13 00:40:30.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.482835 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:40:30.482949 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:40:30.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.484310 systemd[1]: Stopped target cryptsetup.target. May 13 00:40:30.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.485523 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:40:30.485624 systemd[1]: Stopped dracut-initqueue.service. May 13 00:40:30.487162 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:40:30.487272 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:40:30.488621 systemd[1]: Stopped target paths.target. May 13 00:40:30.489869 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:40:30.493095 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:40:30.494201 systemd[1]: Stopped target slices.target. May 13 00:40:30.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.495534 systemd[1]: Stopped target sockets.target. May 13 00:40:30.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.497148 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:40:30.497269 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:40:30.503317 iscsid[751]: iscsid shutting down. May 13 00:40:30.498796 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:40:30.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.498892 systemd[1]: Stopped ignition-files.service. May 13 00:40:30.500980 systemd[1]: Stopping ignition-mount.service... May 13 00:40:30.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.502642 systemd[1]: Stopping iscsid.service... May 13 00:40:30.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.511470 ignition[893]: INFO : Ignition 2.14.0 May 13 00:40:30.511470 ignition[893]: INFO : Stage: umount May 13 00:40:30.511470 ignition[893]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:40:30.511470 ignition[893]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:40:30.511470 ignition[893]: INFO : umount: umount passed May 13 00:40:30.511470 ignition[893]: INFO : Ignition finished successfully May 13 00:40:30.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.503786 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:40:30.503897 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:40:30.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.505848 systemd[1]: Stopping sysroot-boot.service... May 13 00:40:30.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.507211 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:40:30.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.507358 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:40:30.508742 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:40:30.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.508831 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:40:30.512322 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:40:30.512473 systemd[1]: Stopped iscsid.service. May 13 00:40:30.513814 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:40:30.513908 systemd[1]: Stopped ignition-mount.service. May 13 00:40:30.516014 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:40:30.517211 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:40:30.517308 systemd[1]: Finished initrd-cleanup.service. May 13 00:40:30.518680 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:40:30.518715 systemd[1]: Closed iscsid.socket. May 13 00:40:30.520102 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:40:30.520156 systemd[1]: Stopped ignition-disks.service. May 13 00:40:30.521886 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:40:30.521931 systemd[1]: Stopped ignition-kargs.service. May 13 00:40:30.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.523346 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:40:30.523387 systemd[1]: Stopped ignition-setup.service. May 13 00:40:30.551000 audit: BPF prog-id=6 op=UNLOAD May 13 00:40:30.524934 systemd[1]: Stopping iscsiuio.service... May 13 00:40:30.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.528326 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:40:30.528435 systemd[1]: Stopped iscsiuio.service. May 13 00:40:30.529481 systemd[1]: Stopped target network.target. May 13 00:40:30.531124 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:40:30.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.531170 systemd[1]: Closed iscsiuio.socket. May 13 00:40:30.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.532746 systemd[1]: Stopping systemd-networkd.service... May 13 00:40:30.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.534461 systemd[1]: Stopping systemd-resolved.service... May 13 00:40:30.545302 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:40:30.545414 systemd[1]: Stopped systemd-resolved.service. May 13 00:40:30.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.547979 systemd-networkd[739]: eth0: DHCPv6 lease lost May 13 00:40:30.567000 audit: BPF prog-id=9 op=UNLOAD May 13 00:40:30.550925 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:40:30.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.551035 systemd[1]: Stopped systemd-networkd.service. May 13 00:40:30.552637 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:40:30.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.552667 systemd[1]: Closed systemd-networkd.socket. May 13 00:40:30.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.554575 systemd[1]: Stopping network-cleanup.service... May 13 00:40:30.555857 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:40:30.555927 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:40:30.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.557436 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:40:30.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.557480 systemd[1]: Stopped systemd-sysctl.service. May 13 00:40:30.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.559474 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:40:30.559517 systemd[1]: Stopped systemd-modules-load.service. May 13 00:40:30.560495 systemd[1]: Stopping systemd-udevd.service... May 13 00:40:30.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.564894 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:40:30.565412 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:40:30.565490 systemd[1]: Stopped sysroot-boot.service. May 13 00:40:30.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:30.567315 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:40:30.567368 systemd[1]: Stopped initrd-setup-root.service. May 13 00:40:30.569160 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:40:30.569261 systemd[1]: Stopped network-cleanup.service. May 13 00:40:30.573335 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:40:30.573459 systemd[1]: Stopped systemd-udevd.service. May 13 00:40:30.574716 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:40:30.574751 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:40:30.575975 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:40:30.576009 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:40:30.577396 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:40:30.577450 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:40:30.578997 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:40:30.579047 systemd[1]: Stopped dracut-cmdline.service. May 13 00:40:30.580371 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:40:30.580415 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:40:30.582806 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:40:30.584557 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:40:30.584618 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:40:30.588526 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:40:30.588621 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:40:30.590122 systemd[1]: Reached target initrd-switch-root.target. May 13 00:40:30.592239 systemd[1]: Starting initrd-switch-root.service... May 13 00:40:30.599298 systemd[1]: Switching root. May 13 00:40:30.620575 systemd-journald[290]: Journal stopped May 13 00:40:32.605677 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 13 00:40:32.605731 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:40:32.605745 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:40:32.605754 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:40:32.605766 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:40:32.605776 kernel: SELinux: policy capability open_perms=1 May 13 00:40:32.605792 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:40:32.605802 kernel: SELinux: policy capability always_check_network=0 May 13 00:40:32.605811 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:40:32.605821 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:40:32.605830 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:40:32.605843 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:40:32.605852 systemd[1]: Successfully loaded SELinux policy in 34.817ms. May 13 00:40:32.605869 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.273ms. May 13 00:40:32.605881 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:40:32.605892 systemd[1]: Detected virtualization kvm. May 13 00:40:32.605902 systemd[1]: Detected architecture arm64. May 13 00:40:32.605912 systemd[1]: Detected first boot. May 13 00:40:32.605922 systemd[1]: Initializing machine ID from VM UUID. May 13 00:40:32.605933 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:40:32.605943 systemd[1]: Populated /etc with preset unit settings. May 13 00:40:32.605954 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:40:32.605965 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:40:32.605976 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:40:32.605987 kernel: kauditd_printk_skb: 80 callbacks suppressed May 13 00:40:32.605996 kernel: audit: type=1334 audit(1747096832.468:84): prog-id=12 op=LOAD May 13 00:40:32.606005 kernel: audit: type=1334 audit(1747096832.468:85): prog-id=3 op=UNLOAD May 13 00:40:32.606015 kernel: audit: type=1334 audit(1747096832.468:86): prog-id=13 op=LOAD May 13 00:40:32.606025 kernel: audit: type=1334 audit(1747096832.469:87): prog-id=14 op=LOAD May 13 00:40:32.606036 kernel: audit: type=1334 audit(1747096832.469:88): prog-id=4 op=UNLOAD May 13 00:40:32.606045 kernel: audit: type=1334 audit(1747096832.469:89): prog-id=5 op=UNLOAD May 13 00:40:32.606054 kernel: audit: type=1334 audit(1747096832.470:90): prog-id=15 op=LOAD May 13 00:40:32.606063 kernel: audit: type=1334 audit(1747096832.470:91): prog-id=12 op=UNLOAD May 13 00:40:32.606093 kernel: audit: type=1334 audit(1747096832.471:92): prog-id=16 op=LOAD May 13 00:40:32.606105 kernel: audit: type=1334 audit(1747096832.471:93): prog-id=17 op=LOAD May 13 00:40:32.606117 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:40:32.606127 systemd[1]: Stopped initrd-switch-root.service. May 13 00:40:32.606137 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:40:32.606153 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:40:32.606164 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:40:32.606181 systemd[1]: Created slice system-getty.slice. May 13 00:40:32.606210 systemd[1]: Created slice system-modprobe.slice. May 13 00:40:32.606222 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:40:32.606232 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:40:32.606242 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:40:32.606253 systemd[1]: Created slice user.slice. May 13 00:40:32.606264 systemd[1]: Started systemd-ask-password-console.path. May 13 00:40:32.606275 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:40:32.606290 systemd[1]: Set up automount boot.automount. May 13 00:40:32.606300 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:40:32.606310 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:40:32.606320 systemd[1]: Stopped target initrd-fs.target. May 13 00:40:32.606332 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:40:32.606342 systemd[1]: Reached target integritysetup.target. May 13 00:40:32.606352 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:40:32.606362 systemd[1]: Reached target remote-fs.target. May 13 00:40:32.606373 systemd[1]: Reached target slices.target. May 13 00:40:32.606383 systemd[1]: Reached target swap.target. May 13 00:40:32.606393 systemd[1]: Reached target torcx.target. May 13 00:40:32.606404 systemd[1]: Reached target veritysetup.target. May 13 00:40:32.606414 systemd[1]: Listening on systemd-coredump.socket. May 13 00:40:32.606426 systemd[1]: Listening on systemd-initctl.socket. May 13 00:40:32.606436 systemd[1]: Listening on systemd-networkd.socket. May 13 00:40:32.606446 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:40:32.606456 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:40:32.606467 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:40:32.606477 systemd[1]: Mounting dev-hugepages.mount... May 13 00:40:32.606487 systemd[1]: Mounting dev-mqueue.mount... May 13 00:40:32.606498 systemd[1]: Mounting media.mount... May 13 00:40:32.606509 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:40:32.606520 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:40:32.606533 systemd[1]: Mounting tmp.mount... May 13 00:40:32.606544 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:40:32.606554 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:40:32.606565 systemd[1]: Starting kmod-static-nodes.service... May 13 00:40:32.606575 systemd[1]: Starting modprobe@configfs.service... May 13 00:40:32.606585 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:40:32.606595 systemd[1]: Starting modprobe@drm.service... May 13 00:40:32.606605 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:40:32.606616 systemd[1]: Starting modprobe@fuse.service... May 13 00:40:32.606627 systemd[1]: Starting modprobe@loop.service... May 13 00:40:32.606638 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:40:32.606648 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:40:32.606658 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:40:32.606668 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:40:32.606678 kernel: fuse: init (API version 7.34) May 13 00:40:32.606688 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:40:32.606698 systemd[1]: Stopped systemd-journald.service. May 13 00:40:32.606710 systemd[1]: Starting systemd-journald.service... May 13 00:40:32.606720 kernel: loop: module loaded May 13 00:40:32.606730 systemd[1]: Starting systemd-modules-load.service... May 13 00:40:32.606741 systemd[1]: Starting systemd-network-generator.service... May 13 00:40:32.606751 systemd[1]: Starting systemd-remount-fs.service... May 13 00:40:32.606762 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:40:32.606772 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:40:32.606782 systemd[1]: Stopped verity-setup.service. May 13 00:40:32.606793 systemd[1]: Mounted dev-hugepages.mount. May 13 00:40:32.606804 systemd[1]: Mounted dev-mqueue.mount. May 13 00:40:32.606815 systemd[1]: Mounted media.mount. May 13 00:40:32.606825 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:40:32.606835 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:40:32.606846 systemd[1]: Mounted tmp.mount. May 13 00:40:32.606856 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:40:32.606867 systemd[1]: Finished kmod-static-nodes.service. May 13 00:40:32.606879 systemd-journald[1000]: Journal started May 13 00:40:32.606921 systemd-journald[1000]: Runtime Journal (/run/log/journal/89a5bef858794d03ad4d22cdb76bedb1) is 6.0M, max 48.7M, 42.6M free. May 13 00:40:30.689000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:40:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:40:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:40:30.755000 audit: BPF prog-id=10 op=LOAD May 13 00:40:30.755000 audit: BPF prog-id=10 op=UNLOAD May 13 00:40:30.755000 audit: BPF prog-id=11 op=LOAD May 13 00:40:30.755000 audit: BPF prog-id=11 op=UNLOAD May 13 00:40:30.800000 audit[926]: AVC avc: denied { associate } for pid=926 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:40:30.800000 audit[926]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=909 pid=926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.800000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:40:30.801000 audit[926]: AVC avc: denied { associate } for pid=926 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:40:30.801000 audit[926]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=909 pid=926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:30.801000 audit: CWD cwd="/" May 13 00:40:30.801000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:30.801000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:30.801000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:40:32.468000 audit: BPF prog-id=12 op=LOAD May 13 00:40:32.468000 audit: BPF prog-id=3 op=UNLOAD May 13 00:40:32.468000 audit: BPF prog-id=13 op=LOAD May 13 00:40:32.469000 audit: BPF prog-id=14 op=LOAD May 13 00:40:32.469000 audit: BPF prog-id=4 op=UNLOAD May 13 00:40:32.469000 audit: BPF prog-id=5 op=UNLOAD May 13 00:40:32.470000 audit: BPF prog-id=15 op=LOAD May 13 00:40:32.470000 audit: BPF prog-id=12 op=UNLOAD May 13 00:40:32.471000 audit: BPF prog-id=16 op=LOAD May 13 00:40:32.471000 audit: BPF prog-id=17 op=LOAD May 13 00:40:32.471000 audit: BPF prog-id=13 op=UNLOAD May 13 00:40:32.471000 audit: BPF prog-id=14 op=UNLOAD May 13 00:40:32.473000 audit: BPF prog-id=18 op=LOAD May 13 00:40:32.473000 audit: BPF prog-id=15 op=UNLOAD May 13 00:40:32.474000 audit: BPF prog-id=19 op=LOAD May 13 00:40:32.475000 audit: BPF prog-id=20 op=LOAD May 13 00:40:32.475000 audit: BPF prog-id=16 op=UNLOAD May 13 00:40:32.475000 audit: BPF prog-id=17 op=UNLOAD May 13 00:40:32.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.486000 audit: BPF prog-id=18 op=UNLOAD May 13 00:40:32.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.577000 audit: BPF prog-id=21 op=LOAD May 13 00:40:32.577000 audit: BPF prog-id=22 op=LOAD May 13 00:40:32.577000 audit: BPF prog-id=23 op=LOAD May 13 00:40:32.577000 audit: BPF prog-id=19 op=UNLOAD May 13 00:40:32.577000 audit: BPF prog-id=20 op=UNLOAD May 13 00:40:32.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.604000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:40:32.604000 audit[1000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc3ca66e0 a2=4000 a3=1 items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:32.604000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:40:32.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.466865 systemd[1]: Queued start job for default target multi-user.target. May 13 00:40:32.608190 systemd[1]: Started systemd-journald.service. May 13 00:40:30.798452 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:40:32.466876 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:40:30.798728 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:40:32.475740 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:40:30.798748 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:40:30.798778 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:40:30.798788 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:40:30.798816 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:40:30.798828 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:40:30.799029 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:40:30.799063 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:40:30.799094 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:40:30.799912 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:40:30.799947 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:40:30.799966 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:40:30.799980 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:40:30.799998 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:40:30.800012 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:40:32.220050 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:40:32.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.220370 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:40:32.220484 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:40:32.220668 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:40:32.220724 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:40:32.220782 /usr/lib/systemd/system-generators/torcx-generator[926]: time="2025-05-13T00:40:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:40:32.610153 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:40:32.610319 systemd[1]: Finished modprobe@configfs.service. May 13 00:40:32.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.611496 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:40:32.611658 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:40:32.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.612862 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:40:32.613018 systemd[1]: Finished modprobe@drm.service. May 13 00:40:32.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.614172 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:40:32.614353 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:40:32.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.615497 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:40:32.615653 systemd[1]: Finished modprobe@fuse.service. May 13 00:40:32.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.616793 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:40:32.616946 systemd[1]: Finished modprobe@loop.service. May 13 00:40:32.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.618054 systemd[1]: Finished systemd-modules-load.service. May 13 00:40:32.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.619320 systemd[1]: Finished systemd-network-generator.service. May 13 00:40:32.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.620547 systemd[1]: Finished systemd-remount-fs.service. May 13 00:40:32.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.621896 systemd[1]: Reached target network-pre.target. May 13 00:40:32.624197 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:40:32.626023 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:40:32.626997 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:40:32.629245 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:40:32.631297 systemd[1]: Starting systemd-journal-flush.service... May 13 00:40:32.632252 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:40:32.633367 systemd[1]: Starting systemd-random-seed.service... May 13 00:40:32.636026 systemd-journald[1000]: Time spent on flushing to /var/log/journal/89a5bef858794d03ad4d22cdb76bedb1 is 18.682ms for 981 entries. May 13 00:40:32.636026 systemd-journald[1000]: System Journal (/var/log/journal/89a5bef858794d03ad4d22cdb76bedb1) is 8.0M, max 195.6M, 187.6M free. May 13 00:40:32.665395 systemd-journald[1000]: Received client request to flush runtime journal. May 13 00:40:32.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:32.634282 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:40:32.635361 systemd[1]: Starting systemd-sysctl.service... May 13 00:40:32.637197 systemd[1]: Starting systemd-sysusers.service... May 13 00:40:32.640204 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:40:32.666224 udevadm[1026]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:40:32.641727 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:40:32.642801 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:40:32.644781 systemd[1]: Starting systemd-udev-settle.service... May 13 00:40:32.646885 systemd[1]: Finished systemd-random-seed.service. May 13 00:40:32.648268 systemd[1]: Reached target first-boot-complete.target. May 13 00:40:32.655546 systemd[1]: Finished systemd-sysusers.service. May 13 00:40:32.661952 systemd[1]: Finished systemd-sysctl.service. May 13 00:40:32.666314 systemd[1]: Finished systemd-journal-flush.service. May 13 00:40:32.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.012814 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:40:33.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.014000 audit: BPF prog-id=24 op=LOAD May 13 00:40:33.014000 audit: BPF prog-id=25 op=LOAD May 13 00:40:33.014000 audit: BPF prog-id=7 op=UNLOAD May 13 00:40:33.014000 audit: BPF prog-id=8 op=UNLOAD May 13 00:40:33.015321 systemd[1]: Starting systemd-udevd.service... May 13 00:40:33.032916 systemd-udevd[1030]: Using default interface naming scheme 'v252'. May 13 00:40:33.044710 systemd[1]: Started systemd-udevd.service. May 13 00:40:33.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.046000 audit: BPF prog-id=26 op=LOAD May 13 00:40:33.047675 systemd[1]: Starting systemd-networkd.service... May 13 00:40:33.057000 audit: BPF prog-id=27 op=LOAD May 13 00:40:33.057000 audit: BPF prog-id=28 op=LOAD May 13 00:40:33.057000 audit: BPF prog-id=29 op=LOAD May 13 00:40:33.058511 systemd[1]: Starting systemd-userdbd.service... May 13 00:40:33.066000 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 13 00:40:33.090024 systemd[1]: Started systemd-userdbd.service. May 13 00:40:33.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.101062 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:40:33.139618 systemd-networkd[1040]: lo: Link UP May 13 00:40:33.139628 systemd-networkd[1040]: lo: Gained carrier May 13 00:40:33.139960 systemd-networkd[1040]: Enumeration completed May 13 00:40:33.140078 systemd[1]: Started systemd-networkd.service. May 13 00:40:33.140506 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:40:33.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.147266 systemd-networkd[1040]: eth0: Link UP May 13 00:40:33.147279 systemd-networkd[1040]: eth0: Gained carrier May 13 00:40:33.161507 systemd[1]: Finished systemd-udev-settle.service. May 13 00:40:33.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.163751 systemd[1]: Starting lvm2-activation-early.service... May 13 00:40:33.167244 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.138/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:40:33.177491 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:40:33.204030 systemd[1]: Finished lvm2-activation-early.service. May 13 00:40:33.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.205139 systemd[1]: Reached target cryptsetup.target. May 13 00:40:33.207244 systemd[1]: Starting lvm2-activation.service... May 13 00:40:33.210785 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:40:33.251965 systemd[1]: Finished lvm2-activation.service. May 13 00:40:33.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.253026 systemd[1]: Reached target local-fs-pre.target. May 13 00:40:33.253970 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:40:33.254006 systemd[1]: Reached target local-fs.target. May 13 00:40:33.254845 systemd[1]: Reached target machines.target. May 13 00:40:33.257045 systemd[1]: Starting ldconfig.service... May 13 00:40:33.258229 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:40:33.258287 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.259476 systemd[1]: Starting systemd-boot-update.service... May 13 00:40:33.261546 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:40:33.263940 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:40:33.267745 systemd[1]: Starting systemd-sysext.service... May 13 00:40:33.269779 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl) May 13 00:40:33.271950 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:40:33.274341 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:40:33.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.284620 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:40:33.289475 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:40:33.289673 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:40:33.302111 kernel: loop0: detected capacity change from 0 to 201592 May 13 00:40:33.336587 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:40:33.338117 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:40:33.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.342101 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:40:33.352721 systemd-fsck[1075]: fsck.fat 4.2 (2021-01-31) May 13 00:40:33.352721 systemd-fsck[1075]: /dev/vda1: 236 files, 117310/258078 clusters May 13 00:40:33.355608 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:40:33.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.359302 systemd[1]: Mounting boot.mount... May 13 00:40:33.361188 kernel: loop1: detected capacity change from 0 to 201592 May 13 00:40:33.367325 (sd-sysext)[1078]: Using extensions 'kubernetes'. May 13 00:40:33.367671 (sd-sysext)[1078]: Merged extensions into '/usr'. May 13 00:40:33.368495 systemd[1]: Mounted boot.mount. May 13 00:40:33.384700 systemd[1]: Finished systemd-boot-update.service. May 13 00:40:33.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.386399 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:40:33.388350 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:40:33.390658 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:40:33.393937 systemd[1]: Starting modprobe@loop.service... May 13 00:40:33.395027 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:40:33.395436 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.396766 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:40:33.396997 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:40:33.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.398757 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:40:33.398889 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:40:33.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.400434 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:40:33.400554 systemd[1]: Finished modprobe@loop.service. May 13 00:40:33.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.402006 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:40:33.402136 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:40:33.439401 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:40:33.442672 systemd[1]: Finished ldconfig.service. May 13 00:40:33.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.596098 systemd[1]: Mounting usr-share-oem.mount... May 13 00:40:33.601214 systemd[1]: Mounted usr-share-oem.mount. May 13 00:40:33.603120 systemd[1]: Finished systemd-sysext.service. May 13 00:40:33.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.605323 systemd[1]: Starting ensure-sysext.service... May 13 00:40:33.607143 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:40:33.611692 systemd[1]: Reloading. May 13 00:40:33.622719 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:40:33.624746 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:40:33.627455 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:40:33.653671 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-13T00:40:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:40:33.653705 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-13T00:40:33Z" level=info msg="torcx already run" May 13 00:40:33.715925 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:40:33.715947 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:40:33.731244 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:40:33.773000 audit: BPF prog-id=30 op=LOAD May 13 00:40:33.773000 audit: BPF prog-id=21 op=UNLOAD May 13 00:40:33.773000 audit: BPF prog-id=31 op=LOAD May 13 00:40:33.773000 audit: BPF prog-id=32 op=LOAD May 13 00:40:33.773000 audit: BPF prog-id=22 op=UNLOAD May 13 00:40:33.773000 audit: BPF prog-id=23 op=UNLOAD May 13 00:40:33.774000 audit: BPF prog-id=33 op=LOAD May 13 00:40:33.774000 audit: BPF prog-id=34 op=LOAD May 13 00:40:33.774000 audit: BPF prog-id=24 op=UNLOAD May 13 00:40:33.774000 audit: BPF prog-id=25 op=UNLOAD May 13 00:40:33.775000 audit: BPF prog-id=35 op=LOAD May 13 00:40:33.775000 audit: BPF prog-id=27 op=UNLOAD May 13 00:40:33.775000 audit: BPF prog-id=36 op=LOAD May 13 00:40:33.775000 audit: BPF prog-id=37 op=LOAD May 13 00:40:33.775000 audit: BPF prog-id=28 op=UNLOAD May 13 00:40:33.775000 audit: BPF prog-id=29 op=UNLOAD May 13 00:40:33.776000 audit: BPF prog-id=38 op=LOAD May 13 00:40:33.776000 audit: BPF prog-id=26 op=UNLOAD May 13 00:40:33.778676 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:40:33.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.783371 systemd[1]: Starting audit-rules.service... May 13 00:40:33.785469 systemd[1]: Starting clean-ca-certificates.service... May 13 00:40:33.787783 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:40:33.792000 audit: BPF prog-id=39 op=LOAD May 13 00:40:33.796000 audit: BPF prog-id=40 op=LOAD May 13 00:40:33.793701 systemd[1]: Starting systemd-resolved.service... May 13 00:40:33.798025 systemd[1]: Starting systemd-timesyncd.service... May 13 00:40:33.800099 systemd[1]: Starting systemd-update-utmp.service... May 13 00:40:33.803125 systemd[1]: Finished clean-ca-certificates.service. May 13 00:40:33.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.804345 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:40:33.805000 audit[1155]: SYSTEM_BOOT pid=1155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:40:33.808092 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:40:33.809730 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:40:33.813126 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:40:33.816646 systemd[1]: Starting modprobe@loop.service... May 13 00:40:33.817568 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:40:33.817745 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.817905 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:40:33.819231 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:40:33.819388 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:40:33.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.820883 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:40:33.821010 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:40:33.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.822538 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:40:33.822664 systemd[1]: Finished modprobe@loop.service. May 13 00:40:33.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.826327 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:40:33.827845 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:40:33.829924 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:40:33.832528 systemd[1]: Starting modprobe@loop.service... May 13 00:40:33.833371 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:40:33.833501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.833597 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:40:33.834555 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:40:33.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.836129 systemd[1]: Finished systemd-update-utmp.service. May 13 00:40:33.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.837544 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:40:33.837668 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:40:33.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.839221 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:40:33.839351 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:40:33.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.840690 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:40:33.840800 systemd[1]: Finished modprobe@loop.service. May 13 00:40:33.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:33.843035 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:40:33.843153 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:40:33.844783 systemd[1]: Starting systemd-update-done.service... May 13 00:40:33.848273 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:40:33.849566 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:40:33.852621 systemd[1]: Starting modprobe@drm.service... May 13 00:40:33.852000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:40:33.852000 audit[1172]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd839cdb0 a2=420 a3=0 items=0 ppid=1146 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:33.852000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:40:33.853030 augenrules[1172]: No rules May 13 00:40:33.852911 systemd-resolved[1150]: Positive Trust Anchors: May 13 00:40:33.852921 systemd-resolved[1150]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:40:33.853332 systemd-resolved[1150]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:40:33.854664 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:40:33.856734 systemd[1]: Starting modprobe@loop.service... May 13 00:40:33.857665 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:40:33.857844 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.859278 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:40:33.860373 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:40:33.861576 systemd[1]: Finished audit-rules.service. May 13 00:40:33.862938 systemd[1]: Finished systemd-update-done.service. May 13 00:40:33.864341 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:40:33.864462 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:40:33.865790 systemd-resolved[1150]: Defaulting to hostname 'linux'. May 13 00:40:33.865936 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:40:33.866050 systemd[1]: Finished modprobe@drm.service. May 13 00:40:33.867316 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:40:33.867440 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:40:33.868836 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:40:33.868954 systemd[1]: Finished modprobe@loop.service. May 13 00:40:33.870120 systemd[1]: Started systemd-resolved.service. May 13 00:40:33.870352 systemd-timesyncd[1151]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:40:33.870407 systemd-timesyncd[1151]: Initial clock synchronization to Tue 2025-05-13 00:40:34.177599 UTC. May 13 00:40:33.871380 systemd[1]: Started systemd-timesyncd.service. May 13 00:40:33.873030 systemd[1]: Reached target network.target. May 13 00:40:33.873904 systemd[1]: Reached target nss-lookup.target. May 13 00:40:33.874790 systemd[1]: Reached target time-set.target. May 13 00:40:33.875805 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:40:33.875841 systemd[1]: Reached target sysinit.target. May 13 00:40:33.876704 systemd[1]: Started motdgen.path. May 13 00:40:33.877435 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:40:33.878680 systemd[1]: Started logrotate.timer. May 13 00:40:33.879532 systemd[1]: Started mdadm.timer. May 13 00:40:33.880247 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:40:33.881056 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:40:33.881104 systemd[1]: Reached target paths.target. May 13 00:40:33.881818 systemd[1]: Reached target timers.target. May 13 00:40:33.882941 systemd[1]: Listening on dbus.socket. May 13 00:40:33.884985 systemd[1]: Starting docker.socket... May 13 00:40:33.888269 systemd[1]: Listening on sshd.socket. May 13 00:40:33.889144 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.889218 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:40:33.889902 systemd[1]: Finished ensure-sysext.service. May 13 00:40:33.891014 systemd[1]: Listening on docker.socket. May 13 00:40:33.892680 systemd[1]: Reached target sockets.target. May 13 00:40:33.893558 systemd[1]: Reached target basic.target. May 13 00:40:33.894359 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:40:33.894393 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:40:33.895594 systemd[1]: Starting containerd.service... May 13 00:40:33.897455 systemd[1]: Starting dbus.service... May 13 00:40:33.899314 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:40:33.901442 systemd[1]: Starting extend-filesystems.service... May 13 00:40:33.902346 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:40:33.903823 systemd[1]: Starting motdgen.service... May 13 00:40:33.905729 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:40:33.907673 systemd[1]: Starting sshd-keygen.service... May 13 00:40:33.910566 systemd[1]: Starting systemd-logind.service... May 13 00:40:33.911605 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:40:33.911685 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:40:33.912134 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:40:33.912823 systemd[1]: Starting update-engine.service... May 13 00:40:33.916000 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:40:33.918805 jq[1202]: true May 13 00:40:33.918502 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:40:33.918689 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:40:33.924500 extend-filesystems[1190]: Found loop1 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda May 13 00:40:33.925521 extend-filesystems[1190]: Found vda1 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda2 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda3 May 13 00:40:33.925521 extend-filesystems[1190]: Found usr May 13 00:40:33.925521 extend-filesystems[1190]: Found vda4 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda6 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda7 May 13 00:40:33.925521 extend-filesystems[1190]: Found vda9 May 13 00:40:33.925521 extend-filesystems[1190]: Checking size of /dev/vda9 May 13 00:40:33.945897 jq[1189]: false May 13 00:40:33.928546 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:40:33.946364 jq[1204]: true May 13 00:40:33.928714 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:40:33.940770 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:40:33.940959 systemd[1]: Finished motdgen.service. May 13 00:40:33.967928 dbus-daemon[1188]: [system] SELinux support is enabled May 13 00:40:33.968112 systemd[1]: Started dbus.service. May 13 00:40:33.972029 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:40:33.972052 systemd[1]: Reached target system-config.target. May 13 00:40:33.973107 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:40:33.973126 systemd[1]: Reached target user-config.target. May 13 00:40:33.986139 extend-filesystems[1190]: Resized partition /dev/vda9 May 13 00:40:33.989916 systemd-logind[1196]: Watching system buttons on /dev/input/event0 (Power Button) May 13 00:40:33.990117 systemd-logind[1196]: New seat seat0. May 13 00:40:33.992748 systemd[1]: Started systemd-logind.service. May 13 00:40:33.993163 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:40:34.002237 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:40:34.011215 update_engine[1198]: I0513 00:40:34.010931 1198 main.cc:92] Flatcar Update Engine starting May 13 00:40:34.020214 update_engine[1198]: I0513 00:40:34.014124 1198 update_check_scheduler.cc:74] Next update check in 11m45s May 13 00:40:34.014091 systemd[1]: Started update-engine.service. May 13 00:40:34.017362 systemd[1]: Started locksmithd.service. May 13 00:40:34.034134 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:40:34.050738 bash[1235]: Updated "/home/core/.ssh/authorized_keys" May 13 00:40:34.050886 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:40:34.050886 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:40:34.050886 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:40:34.036182 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:40:34.056988 env[1207]: time="2025-05-13T00:40:34.053181512Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:40:34.057204 extend-filesystems[1190]: Resized filesystem in /dev/vda9 May 13 00:40:34.055416 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:40:34.055595 systemd[1]: Finished extend-filesystems.service. May 13 00:40:34.070985 locksmithd[1237]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:40:34.074239 env[1207]: time="2025-05-13T00:40:34.074191896Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:40:34.074395 env[1207]: time="2025-05-13T00:40:34.074366308Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.075711 env[1207]: time="2025-05-13T00:40:34.075673548Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:40:34.075711 env[1207]: time="2025-05-13T00:40:34.075708273Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.075986 env[1207]: time="2025-05-13T00:40:34.075946153Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:40:34.075986 env[1207]: time="2025-05-13T00:40:34.075972446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.076045 env[1207]: time="2025-05-13T00:40:34.075995955Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:40:34.076045 env[1207]: time="2025-05-13T00:40:34.076006797Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.076152 env[1207]: time="2025-05-13T00:40:34.076090991Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.076377 env[1207]: time="2025-05-13T00:40:34.076344697Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:40:34.076511 env[1207]: time="2025-05-13T00:40:34.076487084Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:40:34.076541 env[1207]: time="2025-05-13T00:40:34.076510470Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:40:34.076588 env[1207]: time="2025-05-13T00:40:34.076571279Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:40:34.076624 env[1207]: time="2025-05-13T00:40:34.076588641Z" level=info msg="metadata content store policy set" policy=shared May 13 00:40:34.080373 env[1207]: time="2025-05-13T00:40:34.080338069Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:40:34.080373 env[1207]: time="2025-05-13T00:40:34.080375576Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:40:34.080470 env[1207]: time="2025-05-13T00:40:34.080391526Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:40:34.080470 env[1207]: time="2025-05-13T00:40:34.080426417Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080470 env[1207]: time="2025-05-13T00:40:34.080444569Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080470 env[1207]: time="2025-05-13T00:40:34.080461183Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080590 env[1207]: time="2025-05-13T00:40:34.080474973Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080894 env[1207]: time="2025-05-13T00:40:34.080874099Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080929 env[1207]: time="2025-05-13T00:40:34.080898231Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080929 env[1207]: time="2025-05-13T00:40:34.080912728Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080929 env[1207]: time="2025-05-13T00:40:34.080925895Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:40:34.080987 env[1207]: time="2025-05-13T00:40:34.080939477Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:40:34.081102 env[1207]: time="2025-05-13T00:40:34.081082654Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:40:34.081226 env[1207]: time="2025-05-13T00:40:34.081209008Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:40:34.082329 env[1207]: time="2025-05-13T00:40:34.082189688Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:40:34.082457 env[1207]: time="2025-05-13T00:40:34.082434422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:40:34.082519 env[1207]: time="2025-05-13T00:40:34.082505325Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:40:34.082694 env[1207]: time="2025-05-13T00:40:34.082677286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:40:34.082758 env[1207]: time="2025-05-13T00:40:34.082743662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:40:34.082815 env[1207]: time="2025-05-13T00:40:34.082802768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:40:34.082889 env[1207]: time="2025-05-13T00:40:34.082875416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:40:34.082949 env[1207]: time="2025-05-13T00:40:34.082936226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083005 env[1207]: time="2025-05-13T00:40:34.082992300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083061 env[1207]: time="2025-05-13T00:40:34.083048541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083171 env[1207]: time="2025-05-13T00:40:34.083155207Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083266 env[1207]: time="2025-05-13T00:40:34.083239318Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:40:34.083471 env[1207]: time="2025-05-13T00:40:34.083451197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083546 env[1207]: time="2025-05-13T00:40:34.083532151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083612 env[1207]: time="2025-05-13T00:40:34.083598776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:40:34.083669 env[1207]: time="2025-05-13T00:40:34.083656637Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:40:34.083731 env[1207]: time="2025-05-13T00:40:34.083713749Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:40:34.083794 env[1207]: time="2025-05-13T00:40:34.083779460Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:40:34.083860 env[1207]: time="2025-05-13T00:40:34.083844673Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:40:34.083941 env[1207]: time="2025-05-13T00:40:34.083926085Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:40:34.084266 env[1207]: time="2025-05-13T00:40:34.084210610Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:40:34.086792 env[1207]: time="2025-05-13T00:40:34.084625478Z" level=info msg="Connect containerd service" May 13 00:40:34.086792 env[1207]: time="2025-05-13T00:40:34.084693723Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:40:34.086792 env[1207]: time="2025-05-13T00:40:34.086772672Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:40:34.087180 env[1207]: time="2025-05-13T00:40:34.087154892Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:40:34.087218 env[1207]: time="2025-05-13T00:40:34.087203531Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087215245Z" level=info msg="Start subscribing containerd event" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087254912Z" level=info msg="containerd successfully booted in 0.039248s" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087264632Z" level=info msg="Start recovering state" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087337238Z" level=info msg="Start event monitor" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087361620Z" level=info msg="Start snapshots syncer" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087371879Z" level=info msg="Start cni network conf syncer for default" May 13 00:40:34.088351 env[1207]: time="2025-05-13T00:40:34.087380519Z" level=info msg="Start streaming server" May 13 00:40:34.087327 systemd[1]: Started containerd.service. May 13 00:40:34.673353 systemd-networkd[1040]: eth0: Gained IPv6LL May 13 00:40:34.675242 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:40:34.676562 systemd[1]: Reached target network-online.target. May 13 00:40:34.679005 systemd[1]: Starting kubelet.service... May 13 00:40:35.243165 systemd[1]: Started kubelet.service. May 13 00:40:35.675522 kubelet[1251]: E0513 00:40:35.675425 1251 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:40:35.677561 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:40:35.677685 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:40:37.499435 sshd_keygen[1206]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:40:37.519273 systemd[1]: Finished sshd-keygen.service. May 13 00:40:37.521903 systemd[1]: Starting issuegen.service... May 13 00:40:37.527339 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:40:37.527542 systemd[1]: Finished issuegen.service. May 13 00:40:37.530344 systemd[1]: Starting systemd-user-sessions.service... May 13 00:40:37.537576 systemd[1]: Finished systemd-user-sessions.service. May 13 00:40:37.540171 systemd[1]: Started getty@tty1.service. May 13 00:40:37.542595 systemd[1]: Started serial-getty@ttyAMA0.service. May 13 00:40:37.543774 systemd[1]: Reached target getty.target. May 13 00:40:37.544684 systemd[1]: Reached target multi-user.target. May 13 00:40:37.547258 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:40:37.554870 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:40:37.555063 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:40:37.556342 systemd[1]: Startup finished in 638ms (kernel) + 4.073s (initrd) + 6.907s (userspace) = 11.619s. May 13 00:40:39.092162 systemd[1]: Created slice system-sshd.slice. May 13 00:40:39.093681 systemd[1]: Started sshd@0-10.0.0.138:22-10.0.0.1:51672.service. May 13 00:40:39.145790 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 51672 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.148129 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.157709 systemd-logind[1196]: New session 1 of user core. May 13 00:40:39.159780 systemd[1]: Created slice user-500.slice. May 13 00:40:39.161111 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:40:39.170527 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:40:39.172240 systemd[1]: Starting user@500.service... May 13 00:40:39.175556 (systemd)[1276]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.239009 systemd[1276]: Queued start job for default target default.target. May 13 00:40:39.239574 systemd[1276]: Reached target paths.target. May 13 00:40:39.239609 systemd[1276]: Reached target sockets.target. May 13 00:40:39.239621 systemd[1276]: Reached target timers.target. May 13 00:40:39.239631 systemd[1276]: Reached target basic.target. May 13 00:40:39.239676 systemd[1276]: Reached target default.target. May 13 00:40:39.239702 systemd[1276]: Startup finished in 57ms. May 13 00:40:39.239766 systemd[1]: Started user@500.service. May 13 00:40:39.241014 systemd[1]: Started session-1.scope. May 13 00:40:39.293428 systemd[1]: Started sshd@1-10.0.0.138:22-10.0.0.1:51676.service. May 13 00:40:39.334687 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 51676 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.336363 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.340116 systemd-logind[1196]: New session 2 of user core. May 13 00:40:39.341591 systemd[1]: Started session-2.scope. May 13 00:40:39.396169 sshd[1285]: pam_unix(sshd:session): session closed for user core May 13 00:40:39.400623 systemd[1]: sshd@1-10.0.0.138:22-10.0.0.1:51676.service: Deactivated successfully. May 13 00:40:39.401338 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:40:39.401910 systemd-logind[1196]: Session 2 logged out. Waiting for processes to exit. May 13 00:40:39.402998 systemd[1]: Started sshd@2-10.0.0.138:22-10.0.0.1:51680.service. May 13 00:40:39.403779 systemd-logind[1196]: Removed session 2. May 13 00:40:39.444518 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 51680 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.445742 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.449636 systemd-logind[1196]: New session 3 of user core. May 13 00:40:39.450113 systemd[1]: Started session-3.scope. May 13 00:40:39.499710 sshd[1291]: pam_unix(sshd:session): session closed for user core May 13 00:40:39.503141 systemd[1]: sshd@2-10.0.0.138:22-10.0.0.1:51680.service: Deactivated successfully. May 13 00:40:39.503774 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:40:39.504323 systemd-logind[1196]: Session 3 logged out. Waiting for processes to exit. May 13 00:40:39.505377 systemd[1]: Started sshd@3-10.0.0.138:22-10.0.0.1:51688.service. May 13 00:40:39.506014 systemd-logind[1196]: Removed session 3. May 13 00:40:39.546177 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 51688 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.547268 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.550367 systemd-logind[1196]: New session 4 of user core. May 13 00:40:39.551327 systemd[1]: Started session-4.scope. May 13 00:40:39.605043 sshd[1298]: pam_unix(sshd:session): session closed for user core May 13 00:40:39.609379 systemd[1]: sshd@3-10.0.0.138:22-10.0.0.1:51688.service: Deactivated successfully. May 13 00:40:39.610410 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:40:39.611273 systemd-logind[1196]: Session 4 logged out. Waiting for processes to exit. May 13 00:40:39.612512 systemd-logind[1196]: Removed session 4. May 13 00:40:39.614575 systemd[1]: Started sshd@4-10.0.0.138:22-10.0.0.1:51690.service. May 13 00:40:39.655658 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 51690 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.656909 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.660239 systemd-logind[1196]: New session 5 of user core. May 13 00:40:39.662687 systemd[1]: Started session-5.scope. May 13 00:40:39.722485 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:40:39.722699 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:40:39.735248 dbus-daemon[1188]: avc: received setenforce notice (enforcing=1) May 13 00:40:39.736230 sudo[1307]: pam_unix(sudo:session): session closed for user root May 13 00:40:39.738197 sshd[1304]: pam_unix(sshd:session): session closed for user core May 13 00:40:39.742068 systemd[1]: sshd@4-10.0.0.138:22-10.0.0.1:51690.service: Deactivated successfully. May 13 00:40:39.742805 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:40:39.743453 systemd-logind[1196]: Session 5 logged out. Waiting for processes to exit. May 13 00:40:39.744780 systemd[1]: Started sshd@5-10.0.0.138:22-10.0.0.1:51692.service. May 13 00:40:39.745803 systemd-logind[1196]: Removed session 5. May 13 00:40:39.788735 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 51692 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.790036 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.793560 systemd-logind[1196]: New session 6 of user core. May 13 00:40:39.795598 systemd[1]: Started session-6.scope. May 13 00:40:39.849509 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:40:39.849744 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:40:39.852434 sudo[1315]: pam_unix(sudo:session): session closed for user root May 13 00:40:39.856645 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:40:39.856861 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:40:39.865306 systemd[1]: Stopping audit-rules.service... May 13 00:40:39.865000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:40:39.866715 auditctl[1318]: No rules May 13 00:40:39.867164 kernel: kauditd_printk_skb: 115 callbacks suppressed May 13 00:40:39.867200 kernel: audit: type=1305 audit(1747096839.865:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:40:39.867435 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:40:39.867596 systemd[1]: Stopped audit-rules.service. May 13 00:40:39.865000 audit[1318]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff79c34b0 a2=420 a3=0 items=0 ppid=1 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:39.869002 systemd[1]: Starting audit-rules.service... May 13 00:40:39.872567 kernel: audit: type=1300 audit(1747096839.865:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff79c34b0 a2=420 a3=0 items=0 ppid=1 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:39.872610 kernel: audit: type=1327 audit(1747096839.865:205): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:40:39.865000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:40:39.876592 kernel: audit: type=1131 audit(1747096839.867:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.884991 augenrules[1335]: No rules May 13 00:40:39.885898 systemd[1]: Finished audit-rules.service. May 13 00:40:39.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.886708 sudo[1314]: pam_unix(sudo:session): session closed for user root May 13 00:40:39.885000 audit[1314]: USER_END pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.892359 kernel: audit: type=1130 audit(1747096839.884:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.893151 kernel: audit: type=1106 audit(1747096839.885:208): pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.893189 kernel: audit: type=1104 audit(1747096839.885:209): pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.885000 audit[1314]: CRED_DISP pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.891474 systemd[1]: sshd@5-10.0.0.138:22-10.0.0.1:51692.service: Deactivated successfully. May 13 00:40:39.889282 sshd[1311]: pam_unix(sshd:session): session closed for user core May 13 00:40:39.892013 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:40:39.892533 systemd-logind[1196]: Session 6 logged out. Waiting for processes to exit. May 13 00:40:39.893472 systemd[1]: Started sshd@6-10.0.0.138:22-10.0.0.1:51704.service. May 13 00:40:39.894150 systemd-logind[1196]: Removed session 6. May 13 00:40:39.888000 audit[1311]: USER_END pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.898286 kernel: audit: type=1106 audit(1747096839.888:210): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.898323 kernel: audit: type=1104 audit(1747096839.888:211): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.888000 audit[1311]: CRED_DISP pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.138:22-10.0.0.1:51692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.904095 kernel: audit: type=1131 audit(1747096839.888:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.138:22-10.0.0.1:51692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.138:22-10.0.0.1:51704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:39.934000 audit[1341]: USER_ACCT pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.935437 sshd[1341]: Accepted publickey for core from 10.0.0.1 port 51704 ssh2: RSA SHA256:JqaCSrDIbVVQNbxsbpFjz60HxEXsX2X9A6oTs4HqYQk May 13 00:40:39.935000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.935000 audit[1341]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8ac0430 a2=3 a3=1 items=0 ppid=1 pid=1341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:39.935000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:39.936513 sshd[1341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:39.940161 systemd-logind[1196]: New session 7 of user core. May 13 00:40:39.940838 systemd[1]: Started session-7.scope. May 13 00:40:39.943000 audit[1341]: USER_START pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.944000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:39.991000 audit[1344]: USER_ACCT pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.992640 sudo[1344]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:40:39.991000 audit[1344]: CRED_REFR pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:39.993101 sudo[1344]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:40:39.993000 audit[1344]: USER_START pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:40.004449 systemd[1]: Starting coreos-metadata.service... May 13 00:40:40.010725 systemd[1]: coreos-metadata.service: Deactivated successfully. May 13 00:40:40.010896 systemd[1]: Finished coreos-metadata.service. May 13 00:40:40.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.488783 systemd[1]: Stopped kubelet.service. May 13 00:40:40.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.490860 systemd[1]: Starting kubelet.service... May 13 00:40:40.512826 systemd[1]: Reloading. May 13 00:40:40.568019 /usr/lib/systemd/system-generators/torcx-generator[1402]: time="2025-05-13T00:40:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:40:40.568047 /usr/lib/systemd/system-generators/torcx-generator[1402]: time="2025-05-13T00:40:40Z" level=info msg="torcx already run" May 13 00:40:40.729397 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:40:40.729418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:40:40.744911 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit: BPF prog-id=46 op=LOAD May 13 00:40:40.793000 audit: BPF prog-id=39 op=UNLOAD May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.793000 audit: BPF prog-id=47 op=LOAD May 13 00:40:40.793000 audit: BPF prog-id=40 op=UNLOAD May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit: BPF prog-id=48 op=LOAD May 13 00:40:40.795000 audit: BPF prog-id=30 op=UNLOAD May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit: BPF prog-id=49 op=LOAD May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.795000 audit: BPF prog-id=50 op=LOAD May 13 00:40:40.795000 audit: BPF prog-id=31 op=UNLOAD May 13 00:40:40.795000 audit: BPF prog-id=32 op=UNLOAD May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit: BPF prog-id=51 op=LOAD May 13 00:40:40.796000 audit: BPF prog-id=44 op=UNLOAD May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit: BPF prog-id=52 op=LOAD May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.796000 audit: BPF prog-id=53 op=LOAD May 13 00:40:40.796000 audit: BPF prog-id=33 op=UNLOAD May 13 00:40:40.796000 audit: BPF prog-id=34 op=UNLOAD May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit: BPF prog-id=54 op=LOAD May 13 00:40:40.797000 audit: BPF prog-id=35 op=UNLOAD May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit: BPF prog-id=55 op=LOAD May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit: BPF prog-id=56 op=LOAD May 13 00:40:40.797000 audit: BPF prog-id=36 op=UNLOAD May 13 00:40:40.797000 audit: BPF prog-id=37 op=UNLOAD May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit: BPF prog-id=57 op=LOAD May 13 00:40:40.798000 audit: BPF prog-id=41 op=UNLOAD May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit: BPF prog-id=58 op=LOAD May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.798000 audit: BPF prog-id=59 op=LOAD May 13 00:40:40.798000 audit: BPF prog-id=42 op=UNLOAD May 13 00:40:40.798000 audit: BPF prog-id=43 op=UNLOAD May 13 00:40:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:40.799000 audit: BPF prog-id=60 op=LOAD May 13 00:40:40.799000 audit: BPF prog-id=38 op=UNLOAD May 13 00:40:40.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.809494 systemd[1]: Started kubelet.service. May 13 00:40:40.812438 systemd[1]: Stopping kubelet.service... May 13 00:40:40.813012 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:40:40.813209 systemd[1]: Stopped kubelet.service. May 13 00:40:40.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.814626 systemd[1]: Starting kubelet.service... May 13 00:40:40.906784 systemd[1]: Started kubelet.service. May 13 00:40:40.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:40.941782 kubelet[1451]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:40.941782 kubelet[1451]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:40:40.941782 kubelet[1451]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:40:40.942240 kubelet[1451]: I0513 00:40:40.941843 1451 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:40:41.950414 kubelet[1451]: I0513 00:40:41.950358 1451 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:40:41.950414 kubelet[1451]: I0513 00:40:41.950398 1451 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:40:41.950745 kubelet[1451]: I0513 00:40:41.950674 1451 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:40:41.984272 kubelet[1451]: I0513 00:40:41.984225 1451 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:40:41.992201 kubelet[1451]: E0513 00:40:41.992134 1451 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:40:41.992201 kubelet[1451]: I0513 00:40:41.992167 1451 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:40:41.995081 kubelet[1451]: I0513 00:40:41.995046 1451 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:40:41.995823 kubelet[1451]: I0513 00:40:41.995786 1451 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:40:41.996003 kubelet[1451]: I0513 00:40:41.995830 1451 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.138","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:40:41.996165 kubelet[1451]: I0513 00:40:41.996073 1451 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:40:41.996165 kubelet[1451]: I0513 00:40:41.996098 1451 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:40:41.996304 kubelet[1451]: I0513 00:40:41.996289 1451 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:42.000820 kubelet[1451]: I0513 00:40:42.000786 1451 kubelet.go:446] "Attempting to sync node with API server" May 13 00:40:42.000820 kubelet[1451]: I0513 00:40:42.000814 1451 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:40:42.000922 kubelet[1451]: I0513 00:40:42.000833 1451 kubelet.go:352] "Adding apiserver pod source" May 13 00:40:42.000922 kubelet[1451]: I0513 00:40:42.000843 1451 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:40:42.001065 kubelet[1451]: E0513 00:40:42.001038 1451 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:42.001122 kubelet[1451]: E0513 00:40:42.001094 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:42.003545 kubelet[1451]: I0513 00:40:42.003521 1451 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:40:42.004235 kubelet[1451]: I0513 00:40:42.004219 1451 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:40:42.004343 kubelet[1451]: W0513 00:40:42.004330 1451 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:40:42.005382 kubelet[1451]: I0513 00:40:42.005363 1451 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:40:42.005429 kubelet[1451]: I0513 00:40:42.005404 1451 server.go:1287] "Started kubelet" May 13 00:40:42.005541 kubelet[1451]: I0513 00:40:42.005497 1451 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:40:42.006894 kubelet[1451]: I0513 00:40:42.006867 1451 server.go:490] "Adding debug handlers to kubelet server" May 13 00:40:42.010480 kubelet[1451]: I0513 00:40:42.010401 1451 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:40:42.011161 kubelet[1451]: I0513 00:40:42.011109 1451 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:40:42.011000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:42.011000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:42.011000 audit[1451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bb54a0 a1=40009c4b10 a2=4000bb5470 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.011000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:42.011000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:42.011000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:42.011000 audit[1451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003fe7a0 a1=40009c4b28 a2=4000bb5530 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.011000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:42.013411 kubelet[1451]: I0513 00:40:42.012446 1451 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:40:42.013411 kubelet[1451]: I0513 00:40:42.012481 1451 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:40:42.013411 kubelet[1451]: I0513 00:40:42.012554 1451 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:40:42.014062 kubelet[1451]: I0513 00:40:42.014027 1451 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:40:42.014825 kubelet[1451]: E0513 00:40:42.014780 1451 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.138\" not found" May 13 00:40:42.014989 kubelet[1451]: I0513 00:40:42.014973 1451 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:40:42.015155 kubelet[1451]: I0513 00:40:42.015140 1451 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:40:42.015216 kubelet[1451]: E0513 00:40:42.015008 1451 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:40:42.015327 kubelet[1451]: I0513 00:40:42.015316 1451 reconciler.go:26] "Reconciler: start to sync state" May 13 00:40:42.015825 kubelet[1451]: I0513 00:40:42.015800 1451 factory.go:221] Registration of the systemd container factory successfully May 13 00:40:42.016385 kubelet[1451]: I0513 00:40:42.016349 1451 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:40:42.018111 kubelet[1451]: I0513 00:40:42.018044 1451 factory.go:221] Registration of the containerd container factory successfully May 13 00:40:42.027654 kubelet[1451]: I0513 00:40:42.027602 1451 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:40:42.027654 kubelet[1451]: I0513 00:40:42.027634 1451 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:40:42.027654 kubelet[1451]: I0513 00:40:42.027658 1451 state_mem.go:36] "Initialized new in-memory state store" May 13 00:40:42.040583 kubelet[1451]: E0513 00:40:42.040528 1451 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.138\" not found" node="10.0.0.138" May 13 00:40:42.099135 kubelet[1451]: I0513 00:40:42.099089 1451 policy_none.go:49] "None policy: Start" May 13 00:40:42.099135 kubelet[1451]: I0513 00:40:42.099126 1451 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:40:42.099135 kubelet[1451]: I0513 00:40:42.099140 1451 state_mem.go:35] "Initializing new in-memory state store" May 13 00:40:42.107455 systemd[1]: Created slice kubepods.slice. May 13 00:40:42.107000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.107000 audit[1467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe26fecc0 a2=0 a3=1 items=0 ppid=1451 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:40:42.109000 audit[1472]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.109000 audit[1472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc74f5180 a2=0 a3=1 items=0 ppid=1451 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:40:42.112768 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:40:42.115330 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:40:42.115684 kubelet[1451]: E0513 00:40:42.115475 1451 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.138\" not found" May 13 00:40:42.129343 kubelet[1451]: I0513 00:40:42.129064 1451 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:40:42.128000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:42.128000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:40:42.128000 audit[1451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400068ba70 a1=40009c59f8 a2=400068ba40 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.128000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:40:42.129806 kubelet[1451]: I0513 00:40:42.129784 1451 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:40:42.130275 kubelet[1451]: I0513 00:40:42.130246 1451 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:40:42.130862 kubelet[1451]: I0513 00:40:42.130709 1451 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:40:42.131517 kubelet[1451]: I0513 00:40:42.131161 1451 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:40:42.132100 kubelet[1451]: E0513 00:40:42.132036 1451 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:40:42.132100 kubelet[1451]: E0513 00:40:42.132082 1451 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.138\" not found" May 13 00:40:42.111000 audit[1474]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.111000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdfda46a0 a2=0 a3=1 items=0 ppid=1451 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:42.134000 audit[1479]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.134000 audit[1479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcc2c1090 a2=0 a3=1 items=0 ppid=1451 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:42.168000 audit[1484]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.168000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd80dcbc0 a2=0 a3=1 items=0 ppid=1451 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:40:42.170217 kubelet[1451]: I0513 00:40:42.170178 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:40:42.170000 audit[1485]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:42.170000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff29b8940 a2=0 a3=1 items=0 ppid=1451 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:40:42.170000 audit[1486]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.170000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee9d0ec0 a2=0 a3=1 items=0 ppid=1451 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:40:42.171481 kubelet[1451]: I0513 00:40:42.171376 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:40:42.171481 kubelet[1451]: I0513 00:40:42.171403 1451 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:40:42.171481 kubelet[1451]: I0513 00:40:42.171426 1451 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:40:42.171481 kubelet[1451]: I0513 00:40:42.171434 1451 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:40:42.171000 audit[1487]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:42.171000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeaa25760 a2=0 a3=1 items=0 ppid=1451 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:40:42.171000 audit[1488]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.171000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe7cccfb0 a2=0 a3=1 items=0 ppid=1451 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:40:42.172000 audit[1490]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:42.172000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffecded110 a2=0 a3=1 items=0 ppid=1451 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:40:42.173000 audit[1491]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:42.173000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc10a210 a2=0 a3=1 items=0 ppid=1451 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:40:42.173000 audit[1492]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:42.173000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd43b0b10 a2=0 a3=1 items=0 ppid=1451 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:42.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:40:42.232018 kubelet[1451]: I0513 00:40:42.231907 1451 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.138" May 13 00:40:42.238195 kubelet[1451]: I0513 00:40:42.238161 1451 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.138" May 13 00:40:42.342329 kubelet[1451]: I0513 00:40:42.342297 1451 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 13 00:40:42.342847 env[1207]: time="2025-05-13T00:40:42.342770235Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:40:42.343157 kubelet[1451]: I0513 00:40:42.343040 1451 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 13 00:40:42.436528 sudo[1344]: pam_unix(sudo:session): session closed for user root May 13 00:40:42.436000 audit[1344]: USER_END pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:42.436000 audit[1344]: CRED_DISP pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:40:42.438297 sshd[1341]: pam_unix(sshd:session): session closed for user core May 13 00:40:42.438000 audit[1341]: USER_END pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.438000 audit[1341]: CRED_DISP pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:42.440900 systemd[1]: sshd@6-10.0.0.138:22-10.0.0.1:51704.service: Deactivated successfully. May 13 00:40:42.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.138:22-10.0.0.1:51704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:42.441653 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:40:42.442247 systemd-logind[1196]: Session 7 logged out. Waiting for processes to exit. May 13 00:40:42.442955 systemd-logind[1196]: Removed session 7. May 13 00:40:42.952580 kubelet[1451]: I0513 00:40:42.952546 1451 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 13 00:40:42.953180 kubelet[1451]: W0513 00:40:42.953152 1451 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:40:42.953696 kubelet[1451]: W0513 00:40:42.953152 1451 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:40:42.953801 kubelet[1451]: W0513 00:40:42.953152 1451 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:40:43.001967 kubelet[1451]: E0513 00:40:43.001912 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:43.001967 kubelet[1451]: I0513 00:40:43.001940 1451 apiserver.go:52] "Watching apiserver" May 13 00:40:43.006461 kubelet[1451]: E0513 00:40:43.006421 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:43.011293 systemd[1]: Created slice kubepods-besteffort-pod1f51be59_f5c3_459d_9413_f36eeaeacc9c.slice. May 13 00:40:43.015638 kubelet[1451]: I0513 00:40:43.015606 1451 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:40:43.019001 kubelet[1451]: I0513 00:40:43.018920 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f51be59-f5c3-459d-9413-f36eeaeacc9c-node-certs\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019102 kubelet[1451]: I0513 00:40:43.019027 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-cni-net-dir\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019102 kubelet[1451]: I0513 00:40:43.019050 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/da41ebf0-ccc3-4206-9556-846a7f0d2534-varrun\") pod \"csi-node-driver-lpbrl\" (UID: \"da41ebf0-ccc3-4206-9556-846a7f0d2534\") " pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:43.019102 kubelet[1451]: I0513 00:40:43.019066 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/da41ebf0-ccc3-4206-9556-846a7f0d2534-socket-dir\") pod \"csi-node-driver-lpbrl\" (UID: \"da41ebf0-ccc3-4206-9556-846a7f0d2534\") " pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:43.019196 kubelet[1451]: I0513 00:40:43.019127 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rb2l\" (UniqueName: \"kubernetes.io/projected/da41ebf0-ccc3-4206-9556-846a7f0d2534-kube-api-access-9rb2l\") pod \"csi-node-driver-lpbrl\" (UID: \"da41ebf0-ccc3-4206-9556-846a7f0d2534\") " pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:43.019196 kubelet[1451]: I0513 00:40:43.019150 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f51be59-f5c3-459d-9413-f36eeaeacc9c-tigera-ca-bundle\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019196 kubelet[1451]: I0513 00:40:43.019167 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-var-lib-calico\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019196 kubelet[1451]: I0513 00:40:43.019182 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cfgrc\" (UniqueName: \"kubernetes.io/projected/1f51be59-f5c3-459d-9413-f36eeaeacc9c-kube-api-access-cfgrc\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019285 kubelet[1451]: I0513 00:40:43.019198 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/da41ebf0-ccc3-4206-9556-846a7f0d2534-kubelet-dir\") pod \"csi-node-driver-lpbrl\" (UID: \"da41ebf0-ccc3-4206-9556-846a7f0d2534\") " pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:43.019285 kubelet[1451]: I0513 00:40:43.019214 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/da41ebf0-ccc3-4206-9556-846a7f0d2534-registration-dir\") pod \"csi-node-driver-lpbrl\" (UID: \"da41ebf0-ccc3-4206-9556-846a7f0d2534\") " pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:43.019285 kubelet[1451]: I0513 00:40:43.019231 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-var-run-calico\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019285 kubelet[1451]: I0513 00:40:43.019247 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/17c0fa52-2b65-43f0-8295-9770e33a7ee4-lib-modules\") pod \"kube-proxy-rzncs\" (UID: \"17c0fa52-2b65-43f0-8295-9770e33a7ee4\") " pod="kube-system/kube-proxy-rzncs" May 13 00:40:43.019285 kubelet[1451]: I0513 00:40:43.019261 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-cni-bin-dir\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019389 kubelet[1451]: I0513 00:40:43.019275 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-cni-log-dir\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019389 kubelet[1451]: I0513 00:40:43.019293 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-flexvol-driver-host\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019389 kubelet[1451]: I0513 00:40:43.019309 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/17c0fa52-2b65-43f0-8295-9770e33a7ee4-xtables-lock\") pod \"kube-proxy-rzncs\" (UID: \"17c0fa52-2b65-43f0-8295-9770e33a7ee4\") " pod="kube-system/kube-proxy-rzncs" May 13 00:40:43.019389 kubelet[1451]: I0513 00:40:43.019323 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mlgr\" (UniqueName: \"kubernetes.io/projected/17c0fa52-2b65-43f0-8295-9770e33a7ee4-kube-api-access-7mlgr\") pod \"kube-proxy-rzncs\" (UID: \"17c0fa52-2b65-43f0-8295-9770e33a7ee4\") " pod="kube-system/kube-proxy-rzncs" May 13 00:40:43.019389 kubelet[1451]: I0513 00:40:43.019339 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-lib-modules\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019488 kubelet[1451]: I0513 00:40:43.019356 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-xtables-lock\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019488 kubelet[1451]: I0513 00:40:43.019370 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f51be59-f5c3-459d-9413-f36eeaeacc9c-policysync\") pod \"calico-node-6kpz6\" (UID: \"1f51be59-f5c3-459d-9413-f36eeaeacc9c\") " pod="calico-system/calico-node-6kpz6" May 13 00:40:43.019488 kubelet[1451]: I0513 00:40:43.019385 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/17c0fa52-2b65-43f0-8295-9770e33a7ee4-kube-proxy\") pod \"kube-proxy-rzncs\" (UID: \"17c0fa52-2b65-43f0-8295-9770e33a7ee4\") " pod="kube-system/kube-proxy-rzncs" May 13 00:40:43.021039 systemd[1]: Created slice kubepods-besteffort-pod17c0fa52_2b65_43f0_8295_9770e33a7ee4.slice. May 13 00:40:43.120391 kubelet[1451]: I0513 00:40:43.120358 1451 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:40:43.121842 kubelet[1451]: E0513 00:40:43.121806 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:43.121842 kubelet[1451]: W0513 00:40:43.121827 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:43.121937 kubelet[1451]: E0513 00:40:43.121851 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:43.123674 kubelet[1451]: E0513 00:40:43.123656 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:43.123771 kubelet[1451]: W0513 00:40:43.123756 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:43.123833 kubelet[1451]: E0513 00:40:43.123818 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:43.130832 kubelet[1451]: E0513 00:40:43.130807 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:43.130832 kubelet[1451]: W0513 00:40:43.130825 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:43.130914 kubelet[1451]: E0513 00:40:43.130839 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:43.131483 kubelet[1451]: E0513 00:40:43.131467 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:43.131580 kubelet[1451]: W0513 00:40:43.131566 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:43.131641 kubelet[1451]: E0513 00:40:43.131630 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:43.139508 kubelet[1451]: E0513 00:40:43.139480 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:43.139508 kubelet[1451]: W0513 00:40:43.139497 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:43.139603 kubelet[1451]: E0513 00:40:43.139513 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:43.322144 kubelet[1451]: E0513 00:40:43.321378 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:43.322279 env[1207]: time="2025-05-13T00:40:43.322169054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6kpz6,Uid:1f51be59-f5c3-459d-9413-f36eeaeacc9c,Namespace:calico-system,Attempt:0,}" May 13 00:40:43.322979 kubelet[1451]: E0513 00:40:43.322952 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:43.323708 env[1207]: time="2025-05-13T00:40:43.323669708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rzncs,Uid:17c0fa52-2b65-43f0-8295-9770e33a7ee4,Namespace:kube-system,Attempt:0,}" May 13 00:40:43.862601 env[1207]: time="2025-05-13T00:40:43.862557132Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.863629 env[1207]: time="2025-05-13T00:40:43.863585635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.865852 env[1207]: time="2025-05-13T00:40:43.865821120Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.867307 env[1207]: time="2025-05-13T00:40:43.867276983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.870504 env[1207]: time="2025-05-13T00:40:43.870470325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.871205 env[1207]: time="2025-05-13T00:40:43.871181606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.873463 env[1207]: time="2025-05-13T00:40:43.873433761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.875239 env[1207]: time="2025-05-13T00:40:43.875210084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:43.898252 env[1207]: time="2025-05-13T00:40:43.898176798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:43.898252 env[1207]: time="2025-05-13T00:40:43.898215439Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:43.898252 env[1207]: time="2025-05-13T00:40:43.898226242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:43.898567 env[1207]: time="2025-05-13T00:40:43.898461933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d79b92ac77c817afbaa2dd0f1f095e6fa62c0ded54ecdb775e4cb458c885bd62 pid=1520 runtime=io.containerd.runc.v2 May 13 00:40:43.898896 env[1207]: time="2025-05-13T00:40:43.898840334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:40:43.898945 env[1207]: time="2025-05-13T00:40:43.898908472Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:40:43.898977 env[1207]: time="2025-05-13T00:40:43.898936108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:40:43.899134 env[1207]: time="2025-05-13T00:40:43.899100060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9 pid=1521 runtime=io.containerd.runc.v2 May 13 00:40:43.928677 systemd[1]: Started cri-containerd-d79b92ac77c817afbaa2dd0f1f095e6fa62c0ded54ecdb775e4cb458c885bd62.scope. May 13 00:40:43.931252 systemd[1]: Started cri-containerd-1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9.scope. May 13 00:40:43.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.949000 audit: BPF prog-id=61 op=LOAD May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1520 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437396239326163373763383137616662616132646430663166303935 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437396239326163373763383137616662616132646430663166303935 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit: BPF prog-id=62 op=LOAD May 13 00:40:43.950000 audit[1540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437396239326163373763383137616662616132646430663166303935 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit: BPF prog-id=63 op=LOAD May 13 00:40:43.950000 audit[1540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437396239326163373763383137616662616132646430663166303935 May 13 00:40:43.950000 audit: BPF prog-id=63 op=UNLOAD May 13 00:40:43.950000 audit: BPF prog-id=62 op=UNLOAD May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.950000 audit: BPF prog-id=64 op=LOAD May 13 00:40:43.950000 audit[1540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437396239326163373763383137616662616132646430663166303935 May 13 00:40:43.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit: BPF prog-id=65 op=LOAD May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1521 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343835376462343635663665373861323466356635616531633365 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343835376462343635663665373861323466356635616531633365 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit: BPF prog-id=66 op=LOAD May 13 00:40:43.959000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343835376462343635663665373861323466356635616531633365 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit: BPF prog-id=67 op=LOAD May 13 00:40:43.959000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343835376462343635663665373861323466356635616531633365 May 13 00:40:43.959000 audit: BPF prog-id=67 op=UNLOAD May 13 00:40:43.959000 audit: BPF prog-id=66 op=UNLOAD May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:43.959000 audit: BPF prog-id=68 op=LOAD May 13 00:40:43.959000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:43.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343835376462343635663665373861323466356635616531633365 May 13 00:40:43.963871 env[1207]: time="2025-05-13T00:40:43.963823108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rzncs,Uid:17c0fa52-2b65-43f0-8295-9770e33a7ee4,Namespace:kube-system,Attempt:0,} returns sandbox id \"d79b92ac77c817afbaa2dd0f1f095e6fa62c0ded54ecdb775e4cb458c885bd62\"" May 13 00:40:43.964832 kubelet[1451]: E0513 00:40:43.964802 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:43.966670 env[1207]: time="2025-05-13T00:40:43.966638413Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 13 00:40:43.973642 env[1207]: time="2025-05-13T00:40:43.973607223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6kpz6,Uid:1f51be59-f5c3-459d-9413-f36eeaeacc9c,Namespace:calico-system,Attempt:0,} returns sandbox id \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\"" May 13 00:40:43.974729 kubelet[1451]: E0513 00:40:43.974207 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:44.002780 kubelet[1451]: E0513 00:40:44.002732 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:44.128996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1069134623.mount: Deactivated successfully. May 13 00:40:44.172277 kubelet[1451]: E0513 00:40:44.172189 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:45.003353 kubelet[1451]: E0513 00:40:45.003309 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:45.099290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount767208695.mount: Deactivated successfully. May 13 00:40:45.562503 env[1207]: time="2025-05-13T00:40:45.562456290Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:45.563981 env[1207]: time="2025-05-13T00:40:45.563939572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:45.567076 env[1207]: time="2025-05-13T00:40:45.567031957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:45.568627 env[1207]: time="2025-05-13T00:40:45.568593283Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:45.569081 env[1207]: time="2025-05-13T00:40:45.569033946Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 13 00:40:45.570491 env[1207]: time="2025-05-13T00:40:45.570280754Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:40:45.571379 env[1207]: time="2025-05-13T00:40:45.571348070Z" level=info msg="CreateContainer within sandbox \"d79b92ac77c817afbaa2dd0f1f095e6fa62c0ded54ecdb775e4cb458c885bd62\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:40:45.584072 env[1207]: time="2025-05-13T00:40:45.584041734Z" level=info msg="CreateContainer within sandbox \"d79b92ac77c817afbaa2dd0f1f095e6fa62c0ded54ecdb775e4cb458c885bd62\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"189934bc8c8ce6afaab985b99bd1e3724cb391c523fb11a6cd75de92847f2b82\"" May 13 00:40:45.584926 env[1207]: time="2025-05-13T00:40:45.584898081Z" level=info msg="StartContainer for \"189934bc8c8ce6afaab985b99bd1e3724cb391c523fb11a6cd75de92847f2b82\"" May 13 00:40:45.603534 systemd[1]: run-containerd-runc-k8s.io-189934bc8c8ce6afaab985b99bd1e3724cb391c523fb11a6cd75de92847f2b82-runc.xFgp2g.mount: Deactivated successfully. May 13 00:40:45.604894 systemd[1]: Started cri-containerd-189934bc8c8ce6afaab985b99bd1e3724cb391c523fb11a6cd75de92847f2b82.scope. May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.629626 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 00:40:45.629691 kernel: audit: type=1400 audit(1747096845.627:457): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.632083 kernel: audit: type=1300 audit(1747096845.627:457): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.627000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393933346263386338636536616661616239383562393962643165 May 13 00:40:45.639080 kernel: audit: type=1327 audit(1747096845.627:457): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393933346263386338636536616661616239383562393962643165 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.641768 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.641819 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.646591 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.649462 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.652615 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.652667 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.657547 kernel: audit: type=1400 audit(1747096845.627:458): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.627000 audit: BPF prog-id=69 op=LOAD May 13 00:40:45.627000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393933346263386338636536616661616239383562393962643165 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.628000 audit: BPF prog-id=70 op=LOAD May 13 00:40:45.628000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393933346263386338636536616661616239383562393962643165 May 13 00:40:45.631000 audit: BPF prog-id=70 op=UNLOAD May 13 00:40:45.631000 audit: BPF prog-id=69 op=UNLOAD May 13 00:40:45.631000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:45.631000 audit: BPF prog-id=71 op=LOAD May 13 00:40:45.631000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393933346263386338636536616661616239383562393962643165 May 13 00:40:45.659901 env[1207]: time="2025-05-13T00:40:45.659861321Z" level=info msg="StartContainer for \"189934bc8c8ce6afaab985b99bd1e3724cb391c523fb11a6cd75de92847f2b82\" returns successfully" May 13 00:40:45.847000 audit[1656]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:45.847000 audit[1656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe09bf4d0 a2=0 a3=1 items=0 ppid=1607 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:40:45.848000 audit[1657]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.848000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbd40310 a2=0 a3=1 items=0 ppid=1607 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:40:45.848000 audit[1659]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:45.848000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd770b30 a2=0 a3=1 items=0 ppid=1607 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:40:45.849000 audit[1660]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:45.849000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe597f600 a2=0 a3=1 items=0 ppid=1607 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:40:45.850000 audit[1661]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.850000 audit[1661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff61ac580 a2=0 a3=1 items=0 ppid=1607 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:40:45.851000 audit[1662]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.851000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9f6e190 a2=0 a3=1 items=0 ppid=1607 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:40:45.948000 audit[1663]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.948000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd9cc9ec0 a2=0 a3=1 items=0 ppid=1607 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:40:45.952000 audit[1665]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.952000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd32065e0 a2=0 a3=1 items=0 ppid=1607 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:40:45.955000 audit[1668]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.955000 audit[1668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd2a51230 a2=0 a3=1 items=0 ppid=1607 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:40:45.956000 audit[1669]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.956000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe244eeb0 a2=0 a3=1 items=0 ppid=1607 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:40:45.958000 audit[1671]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.958000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff470abe0 a2=0 a3=1 items=0 ppid=1607 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:40:45.959000 audit[1672]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.959000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed735b20 a2=0 a3=1 items=0 ppid=1607 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:40:45.961000 audit[1674]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.961000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd76bc910 a2=0 a3=1 items=0 ppid=1607 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:40:45.964000 audit[1677]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.964000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffccb97e80 a2=0 a3=1 items=0 ppid=1607 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:40:45.966000 audit[1678]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.966000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe50fff50 a2=0 a3=1 items=0 ppid=1607 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:40:45.968000 audit[1680]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.968000 audit[1680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee6054b0 a2=0 a3=1 items=0 ppid=1607 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:40:45.969000 audit[1681]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.969000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef97e770 a2=0 a3=1 items=0 ppid=1607 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:40:45.971000 audit[1683]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.971000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc98a3f50 a2=0 a3=1 items=0 ppid=1607 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:45.974000 audit[1686]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.974000 audit[1686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed862d40 a2=0 a3=1 items=0 ppid=1607 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:45.977000 audit[1689]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.977000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7b91220 a2=0 a3=1 items=0 ppid=1607 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:40:45.978000 audit[1690]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.978000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffde425fe0 a2=0 a3=1 items=0 ppid=1607 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:40:46.003877 kubelet[1451]: E0513 00:40:46.003806 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:45.980000 audit[1692]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:45.980000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe6878400 a2=0 a3=1 items=0 ppid=1607 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:45.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:46.012000 audit[1696]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:46.012000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc9e4cd80 a2=0 a3=1 items=0 ppid=1607 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:46.014000 audit[1697]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:46.014000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecceb1c0 a2=0 a3=1 items=0 ppid=1607 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:40:46.016000 audit[1699]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:40:46.016000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff0ea5b80 a2=0 a3=1 items=0 ppid=1607 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:40:46.042000 audit[1705]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:46.042000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd74d30c0 a2=0 a3=1 items=0 ppid=1607 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:46.059000 audit[1705]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:46.059000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffd74d30c0 a2=0 a3=1 items=0 ppid=1607 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:46.060000 audit[1712]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.060000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe71d6ce0 a2=0 a3=1 items=0 ppid=1607 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:40:46.062000 audit[1714]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.062000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd451beb0 a2=0 a3=1 items=0 ppid=1607 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:40:46.066000 audit[1717]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.066000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffecc68370 a2=0 a3=1 items=0 ppid=1607 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:40:46.068000 audit[1718]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.068000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd08da8f0 a2=0 a3=1 items=0 ppid=1607 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:40:46.070000 audit[1720]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.070000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5107090 a2=0 a3=1 items=0 ppid=1607 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:40:46.072000 audit[1721]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.072000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6ff3e40 a2=0 a3=1 items=0 ppid=1607 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:40:46.074000 audit[1723]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.074000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffb67af50 a2=0 a3=1 items=0 ppid=1607 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:40:46.078000 audit[1726]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.078000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffb951ae0 a2=0 a3=1 items=0 ppid=1607 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:40:46.079000 audit[1727]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.079000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff67f2b00 a2=0 a3=1 items=0 ppid=1607 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:40:46.081000 audit[1729]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.081000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb8b96c0 a2=0 a3=1 items=0 ppid=1607 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:40:46.082000 audit[1730]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.082000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd29004d0 a2=0 a3=1 items=0 ppid=1607 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:40:46.084000 audit[1732]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.084000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff795000 a2=0 a3=1 items=0 ppid=1607 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:40:46.087000 audit[1735]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.087000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff122b050 a2=0 a3=1 items=0 ppid=1607 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:40:46.090000 audit[1738]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.090000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7a7a240 a2=0 a3=1 items=0 ppid=1607 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:40:46.091000 audit[1739]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.091000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd4fdd5f0 a2=0 a3=1 items=0 ppid=1607 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:40:46.093000 audit[1741]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.093000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff866c0a0 a2=0 a3=1 items=0 ppid=1607 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:46.097000 audit[1744]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.097000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc279d9b0 a2=0 a3=1 items=0 ppid=1607 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:40:46.100000 audit[1745]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.100000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb05ccb0 a2=0 a3=1 items=0 ppid=1607 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:40:46.102000 audit[1747]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.102000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe356b810 a2=0 a3=1 items=0 ppid=1607 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:40:46.103000 audit[1748]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.103000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0852060 a2=0 a3=1 items=0 ppid=1607 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:40:46.105000 audit[1750]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.105000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffcf7eaf0 a2=0 a3=1 items=0 ppid=1607 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:46.109000 audit[1753]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:40:46.109000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc3fb3bd0 a2=0 a3=1 items=0 ppid=1607 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:40:46.111000 audit[1755]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:40:46.111000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffdf86b220 a2=0 a3=1 items=0 ppid=1607 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.111000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:46.112000 audit[1755]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:40:46.112000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdf86b220 a2=0 a3=1 items=0 ppid=1607 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.112000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:46.173629 kubelet[1451]: E0513 00:40:46.173341 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:46.183187 kubelet[1451]: E0513 00:40:46.183162 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:46.197028 kubelet[1451]: I0513 00:40:46.196880 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rzncs" podStartSLOduration=2.592978269 podStartE2EDuration="4.19686409s" podCreationTimestamp="2025-05-13 00:40:42 +0000 UTC" firstStartedPulling="2025-05-13 00:40:43.966206401 +0000 UTC m=+3.055861817" lastFinishedPulling="2025-05-13 00:40:45.570092222 +0000 UTC m=+4.659747638" observedRunningTime="2025-05-13 00:40:46.196363446 +0000 UTC m=+5.286018863" watchObservedRunningTime="2025-05-13 00:40:46.19686409 +0000 UTC m=+5.286519466" May 13 00:40:46.236588 kubelet[1451]: E0513 00:40:46.236548 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.236588 kubelet[1451]: W0513 00:40:46.236580 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.236733 kubelet[1451]: E0513 00:40:46.236605 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.236825 kubelet[1451]: E0513 00:40:46.236810 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.236857 kubelet[1451]: W0513 00:40:46.236822 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.236892 kubelet[1451]: E0513 00:40:46.236856 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.237120 kubelet[1451]: E0513 00:40:46.237066 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.237153 kubelet[1451]: W0513 00:40:46.237122 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.237193 kubelet[1451]: E0513 00:40:46.237159 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.237386 kubelet[1451]: E0513 00:40:46.237375 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.237419 kubelet[1451]: W0513 00:40:46.237389 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.237419 kubelet[1451]: E0513 00:40:46.237398 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.237586 kubelet[1451]: E0513 00:40:46.237573 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.237586 kubelet[1451]: W0513 00:40:46.237585 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.237647 kubelet[1451]: E0513 00:40:46.237593 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.237741 kubelet[1451]: E0513 00:40:46.237729 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.237741 kubelet[1451]: W0513 00:40:46.237739 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.237799 kubelet[1451]: E0513 00:40:46.237746 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.237883 kubelet[1451]: E0513 00:40:46.237871 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.237883 kubelet[1451]: W0513 00:40:46.237882 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.237940 kubelet[1451]: E0513 00:40:46.237891 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238029 kubelet[1451]: E0513 00:40:46.238017 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238029 kubelet[1451]: W0513 00:40:46.238027 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238099 kubelet[1451]: E0513 00:40:46.238035 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238195 kubelet[1451]: E0513 00:40:46.238182 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238195 kubelet[1451]: W0513 00:40:46.238193 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238261 kubelet[1451]: E0513 00:40:46.238201 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238338 kubelet[1451]: E0513 00:40:46.238326 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238338 kubelet[1451]: W0513 00:40:46.238336 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238407 kubelet[1451]: E0513 00:40:46.238344 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238478 kubelet[1451]: E0513 00:40:46.238466 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238478 kubelet[1451]: W0513 00:40:46.238476 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238543 kubelet[1451]: E0513 00:40:46.238483 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238633 kubelet[1451]: E0513 00:40:46.238621 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238633 kubelet[1451]: W0513 00:40:46.238631 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238699 kubelet[1451]: E0513 00:40:46.238638 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238786 kubelet[1451]: E0513 00:40:46.238774 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238786 kubelet[1451]: W0513 00:40:46.238784 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238851 kubelet[1451]: E0513 00:40:46.238793 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.238929 kubelet[1451]: E0513 00:40:46.238918 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.238929 kubelet[1451]: W0513 00:40:46.238928 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.238994 kubelet[1451]: E0513 00:40:46.238935 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239065 kubelet[1451]: E0513 00:40:46.239054 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239065 kubelet[1451]: W0513 00:40:46.239063 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239128 kubelet[1451]: E0513 00:40:46.239071 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239235 kubelet[1451]: E0513 00:40:46.239218 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239235 kubelet[1451]: W0513 00:40:46.239232 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239289 kubelet[1451]: E0513 00:40:46.239240 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239389 kubelet[1451]: E0513 00:40:46.239378 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239389 kubelet[1451]: W0513 00:40:46.239388 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239453 kubelet[1451]: E0513 00:40:46.239396 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239534 kubelet[1451]: E0513 00:40:46.239524 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239534 kubelet[1451]: W0513 00:40:46.239533 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239600 kubelet[1451]: E0513 00:40:46.239540 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239684 kubelet[1451]: E0513 00:40:46.239672 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239684 kubelet[1451]: W0513 00:40:46.239682 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239747 kubelet[1451]: E0513 00:40:46.239690 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.239827 kubelet[1451]: E0513 00:40:46.239816 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.239827 kubelet[1451]: W0513 00:40:46.239825 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.239884 kubelet[1451]: E0513 00:40:46.239833 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.242233 kubelet[1451]: E0513 00:40:46.242213 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.242233 kubelet[1451]: W0513 00:40:46.242231 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.242322 kubelet[1451]: E0513 00:40:46.242247 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.242497 kubelet[1451]: E0513 00:40:46.242476 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.242497 kubelet[1451]: W0513 00:40:46.242488 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.242566 kubelet[1451]: E0513 00:40:46.242503 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.242740 kubelet[1451]: E0513 00:40:46.242715 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.242740 kubelet[1451]: W0513 00:40:46.242729 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.242740 kubelet[1451]: E0513 00:40:46.242745 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.242919 kubelet[1451]: E0513 00:40:46.242908 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.242919 kubelet[1451]: W0513 00:40:46.242919 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.242980 kubelet[1451]: E0513 00:40:46.242931 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.243079 kubelet[1451]: E0513 00:40:46.243064 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.243126 kubelet[1451]: W0513 00:40:46.243092 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.243126 kubelet[1451]: E0513 00:40:46.243105 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.243323 kubelet[1451]: E0513 00:40:46.243311 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.243323 kubelet[1451]: W0513 00:40:46.243322 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.243387 kubelet[1451]: E0513 00:40:46.243335 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.243575 kubelet[1451]: E0513 00:40:46.243558 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.243626 kubelet[1451]: W0513 00:40:46.243574 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.243626 kubelet[1451]: E0513 00:40:46.243590 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.243779 kubelet[1451]: E0513 00:40:46.243766 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.243815 kubelet[1451]: W0513 00:40:46.243779 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.243815 kubelet[1451]: E0513 00:40:46.243793 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.243970 kubelet[1451]: E0513 00:40:46.243960 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.244002 kubelet[1451]: W0513 00:40:46.243970 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.244002 kubelet[1451]: E0513 00:40:46.243979 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.244157 kubelet[1451]: E0513 00:40:46.244147 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.244157 kubelet[1451]: W0513 00:40:46.244158 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.244229 kubelet[1451]: E0513 00:40:46.244166 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.244339 kubelet[1451]: E0513 00:40:46.244328 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.244339 kubelet[1451]: W0513 00:40:46.244339 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.244389 kubelet[1451]: E0513 00:40:46.244350 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.244675 kubelet[1451]: E0513 00:40:46.244662 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:40:46.244675 kubelet[1451]: W0513 00:40:46.244674 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:40:46.244736 kubelet[1451]: E0513 00:40:46.244683 1451 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:40:46.509762 env[1207]: time="2025-05-13T00:40:46.509663077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:46.513334 env[1207]: time="2025-05-13T00:40:46.513226920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:46.515206 env[1207]: time="2025-05-13T00:40:46.515176288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:46.516309 env[1207]: time="2025-05-13T00:40:46.516276173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:46.516944 env[1207]: time="2025-05-13T00:40:46.516898552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 13 00:40:46.518643 env[1207]: time="2025-05-13T00:40:46.518614527Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:40:46.528179 env[1207]: time="2025-05-13T00:40:46.528137526Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce\"" May 13 00:40:46.528551 env[1207]: time="2025-05-13T00:40:46.528509865Z" level=info msg="StartContainer for \"b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce\"" May 13 00:40:46.542989 systemd[1]: Started cri-containerd-b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce.scope. May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1521 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366366646664653832653535333833316235663335653339383435 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit: BPF prog-id=72 op=LOAD May 13 00:40:46.568000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1521 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366366646664653832653535333833316235663335653339383435 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.568000 audit: BPF prog-id=73 op=LOAD May 13 00:40:46.568000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1521 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366366646664653832653535333833316235663335653339383435 May 13 00:40:46.568000 audit: BPF prog-id=73 op=UNLOAD May 13 00:40:46.568000 audit: BPF prog-id=72 op=UNLOAD May 13 00:40:46.569000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:46.569000 audit: BPF prog-id=74 op=LOAD May 13 00:40:46.569000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1521 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:46.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366366646664653832653535333833316235663335653339383435 May 13 00:40:46.583592 env[1207]: time="2025-05-13T00:40:46.583123515Z" level=info msg="StartContainer for \"b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce\" returns successfully" May 13 00:40:46.605580 systemd[1]: cri-containerd-b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce.scope: Deactivated successfully. May 13 00:40:46.611000 audit: BPF prog-id=74 op=UNLOAD May 13 00:40:46.622385 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce-rootfs.mount: Deactivated successfully. May 13 00:40:46.774234 env[1207]: time="2025-05-13T00:40:46.774120169Z" level=info msg="shim disconnected" id=b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce May 13 00:40:46.774449 env[1207]: time="2025-05-13T00:40:46.774428778Z" level=warning msg="cleaning up after shim disconnected" id=b16cfdfde82e553831b5f35e39845cad637367ec20547b073659d8de35e889ce namespace=k8s.io May 13 00:40:46.774514 env[1207]: time="2025-05-13T00:40:46.774499965Z" level=info msg="cleaning up dead shim" May 13 00:40:46.781141 env[1207]: time="2025-05-13T00:40:46.781110642Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:40:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1834 runtime=io.containerd.runc.v2\n" May 13 00:40:47.004152 kubelet[1451]: E0513 00:40:47.004097 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:47.185906 kubelet[1451]: E0513 00:40:47.185813 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:47.185906 kubelet[1451]: E0513 00:40:47.185876 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:47.186615 env[1207]: time="2025-05-13T00:40:47.186582435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:40:48.004855 kubelet[1451]: E0513 00:40:48.004815 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:48.172167 kubelet[1451]: E0513 00:40:48.171847 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:49.005736 kubelet[1451]: E0513 00:40:49.005689 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:49.954053 env[1207]: time="2025-05-13T00:40:49.953985094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:49.955360 env[1207]: time="2025-05-13T00:40:49.955322631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:49.956925 env[1207]: time="2025-05-13T00:40:49.956893572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:49.958735 env[1207]: time="2025-05-13T00:40:49.958703908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:49.959373 env[1207]: time="2025-05-13T00:40:49.959338902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 13 00:40:49.961623 env[1207]: time="2025-05-13T00:40:49.961591237Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:40:49.971945 env[1207]: time="2025-05-13T00:40:49.971660683Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353\"" May 13 00:40:49.972456 env[1207]: time="2025-05-13T00:40:49.972426553Z" level=info msg="StartContainer for \"fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353\"" May 13 00:40:49.989669 systemd[1]: Started cri-containerd-fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353.scope. May 13 00:40:50.006809 kubelet[1451]: E0513 00:40:50.006759 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:50.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626337626662393665396662363365366530363234313439656135 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit: BPF prog-id=75 op=LOAD May 13 00:40:50.008000 audit[1859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:50.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626337626662393665396662363365366530363234313439656135 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit: BPF prog-id=76 op=LOAD May 13 00:40:50.008000 audit[1859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:50.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626337626662393665396662363365366530363234313439656135 May 13 00:40:50.008000 audit: BPF prog-id=76 op=UNLOAD May 13 00:40:50.008000 audit: BPF prog-id=75 op=UNLOAD May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:50.008000 audit: BPF prog-id=77 op=LOAD May 13 00:40:50.008000 audit[1859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:50.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626337626662393665396662363365366530363234313439656135 May 13 00:40:50.019611 env[1207]: time="2025-05-13T00:40:50.019569071Z" level=info msg="StartContainer for \"fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353\" returns successfully" May 13 00:40:50.173761 kubelet[1451]: E0513 00:40:50.173392 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:50.193111 kubelet[1451]: E0513 00:40:50.191971 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:50.531994 env[1207]: time="2025-05-13T00:40:50.531926183Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:40:50.533871 systemd[1]: cri-containerd-fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353.scope: Deactivated successfully. May 13 00:40:50.537000 audit: BPF prog-id=77 op=UNLOAD May 13 00:40:50.582058 kubelet[1451]: I0513 00:40:50.582028 1451 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 13 00:40:50.650106 env[1207]: time="2025-05-13T00:40:50.650035741Z" level=info msg="shim disconnected" id=fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353 May 13 00:40:50.650106 env[1207]: time="2025-05-13T00:40:50.650108349Z" level=warning msg="cleaning up after shim disconnected" id=fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353 namespace=k8s.io May 13 00:40:50.650306 env[1207]: time="2025-05-13T00:40:50.650120765Z" level=info msg="cleaning up dead shim" May 13 00:40:50.656780 env[1207]: time="2025-05-13T00:40:50.656742342Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:40:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1901 runtime=io.containerd.runc.v2\n" May 13 00:40:50.969122 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fbbc7bfb96e9fb63e6e0624149ea5f1494bbe4a9030dca723feb2f3f98239353-rootfs.mount: Deactivated successfully. May 13 00:40:51.007575 kubelet[1451]: E0513 00:40:51.007515 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:51.194480 kubelet[1451]: E0513 00:40:51.194430 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:51.195349 env[1207]: time="2025-05-13T00:40:51.195316552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:40:52.008118 kubelet[1451]: E0513 00:40:52.007607 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:52.188198 systemd[1]: Created slice kubepods-besteffort-podda41ebf0_ccc3_4206_9556_846a7f0d2534.slice. May 13 00:40:52.190319 env[1207]: time="2025-05-13T00:40:52.190272376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lpbrl,Uid:da41ebf0-ccc3-4206-9556-846a7f0d2534,Namespace:calico-system,Attempt:0,}" May 13 00:40:52.320323 env[1207]: time="2025-05-13T00:40:52.318311100Z" level=error msg="Failed to destroy network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:52.320323 env[1207]: time="2025-05-13T00:40:52.318687402Z" level=error msg="encountered an error cleaning up failed sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:52.320323 env[1207]: time="2025-05-13T00:40:52.318744279Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lpbrl,Uid:da41ebf0-ccc3-4206-9556-846a7f0d2534,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:52.319707 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a-shm.mount: Deactivated successfully. May 13 00:40:52.320697 kubelet[1451]: E0513 00:40:52.318998 1451 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:52.320697 kubelet[1451]: E0513 00:40:52.319083 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:52.320697 kubelet[1451]: E0513 00:40:52.319109 1451 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lpbrl" May 13 00:40:52.320803 kubelet[1451]: E0513 00:40:52.319165 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lpbrl_calico-system(da41ebf0-ccc3-4206-9556-846a7f0d2534)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lpbrl_calico-system(da41ebf0-ccc3-4206-9556-846a7f0d2534)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:53.007943 kubelet[1451]: E0513 00:40:53.007888 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:53.197166 kubelet[1451]: I0513 00:40:53.197137 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:40:53.197862 env[1207]: time="2025-05-13T00:40:53.197815429Z" level=info msg="StopPodSandbox for \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\"" May 13 00:40:53.219006 env[1207]: time="2025-05-13T00:40:53.218947565Z" level=error msg="StopPodSandbox for \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\" failed" error="failed to destroy network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:53.219254 kubelet[1451]: E0513 00:40:53.219199 1451 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:40:53.219305 kubelet[1451]: E0513 00:40:53.219272 1451 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a"} May 13 00:40:53.219342 kubelet[1451]: E0513 00:40:53.219325 1451 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da41ebf0-ccc3-4206-9556-846a7f0d2534\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:53.219400 kubelet[1451]: E0513 00:40:53.219350 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da41ebf0-ccc3-4206-9556-846a7f0d2534\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lpbrl" podUID="da41ebf0-ccc3-4206-9556-846a7f0d2534" May 13 00:40:53.515529 systemd[1]: Created slice kubepods-besteffort-pod26a8055a_a641_4717_96cb_afd9f06212eb.slice. May 13 00:40:53.599442 kubelet[1451]: I0513 00:40:53.599392 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hbm8n\" (UniqueName: \"kubernetes.io/projected/26a8055a-a641-4717-96cb-afd9f06212eb-kube-api-access-hbm8n\") pod \"nginx-deployment-7fcdb87857-w7p6k\" (UID: \"26a8055a-a641-4717-96cb-afd9f06212eb\") " pod="default/nginx-deployment-7fcdb87857-w7p6k" May 13 00:40:53.817885 env[1207]: time="2025-05-13T00:40:53.817777955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-w7p6k,Uid:26a8055a-a641-4717-96cb-afd9f06212eb,Namespace:default,Attempt:0,}" May 13 00:40:53.878831 env[1207]: time="2025-05-13T00:40:53.878766989Z" level=error msg="Failed to destroy network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:53.880490 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64-shm.mount: Deactivated successfully. May 13 00:40:53.881495 env[1207]: time="2025-05-13T00:40:53.881404659Z" level=error msg="encountered an error cleaning up failed sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:53.881552 env[1207]: time="2025-05-13T00:40:53.881503839Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-w7p6k,Uid:26a8055a-a641-4717-96cb-afd9f06212eb,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:53.881835 kubelet[1451]: E0513 00:40:53.881790 1451 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:53.881888 kubelet[1451]: E0513 00:40:53.881855 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-w7p6k" May 13 00:40:53.881888 kubelet[1451]: E0513 00:40:53.881875 1451 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-w7p6k" May 13 00:40:53.881942 kubelet[1451]: E0513 00:40:53.881914 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-w7p6k_default(26a8055a-a641-4717-96cb-afd9f06212eb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-w7p6k_default(26a8055a-a641-4717-96cb-afd9f06212eb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-w7p6k" podUID="26a8055a-a641-4717-96cb-afd9f06212eb" May 13 00:40:54.008109 kubelet[1451]: E0513 00:40:54.008047 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:54.199724 kubelet[1451]: I0513 00:40:54.199622 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:40:54.200429 env[1207]: time="2025-05-13T00:40:54.200372619Z" level=info msg="StopPodSandbox for \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\"" May 13 00:40:54.228404 env[1207]: time="2025-05-13T00:40:54.228332198Z" level=error msg="StopPodSandbox for \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\" failed" error="failed to destroy network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:40:54.228648 kubelet[1451]: E0513 00:40:54.228608 1451 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:40:54.228697 kubelet[1451]: E0513 00:40:54.228667 1451 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64"} May 13 00:40:54.228743 kubelet[1451]: E0513 00:40:54.228703 1451 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"26a8055a-a641-4717-96cb-afd9f06212eb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:40:54.228845 kubelet[1451]: E0513 00:40:54.228745 1451 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"26a8055a-a641-4717-96cb-afd9f06212eb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-w7p6k" podUID="26a8055a-a641-4717-96cb-afd9f06212eb" May 13 00:40:54.307000 audit[2040]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.309129 kernel: kauditd_printk_skb: 274 callbacks suppressed May 13 00:40:54.309201 kernel: audit: type=1325 audit(1747096854.307:528): table=filter:65 family=2 entries=16 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.307000 audit[2040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcb474630 a2=0 a3=1 items=0 ppid=1607 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.314578 kernel: audit: type=1300 audit(1747096854.307:528): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcb474630 a2=0 a3=1 items=0 ppid=1607 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.314650 kernel: audit: type=1327 audit(1747096854.307:528): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.324000 audit[2040]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.324000 audit[2040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcb474630 a2=0 a3=1 items=0 ppid=1607 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.331148 kernel: audit: type=1325 audit(1747096854.324:529): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.331209 kernel: audit: type=1300 audit(1747096854.324:529): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcb474630 a2=0 a3=1 items=0 ppid=1607 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.331231 kernel: audit: type=1327 audit(1747096854.324:529): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.358000 audit[2044]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.358000 audit[2044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffb389720 a2=0 a3=1 items=0 ppid=1607 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.364757 kernel: audit: type=1325 audit(1747096854.358:530): table=filter:67 family=2 entries=13 op=nft_register_rule pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.364825 kernel: audit: type=1300 audit(1747096854.358:530): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffb389720 a2=0 a3=1 items=0 ppid=1607 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.364852 kernel: audit: type=1327 audit(1747096854.358:530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.367000 audit[2044]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:54.367000 audit[2044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffb389720 a2=0 a3=1 items=0 ppid=1607 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:54.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:54.370097 kernel: audit: type=1325 audit(1747096854.367:531): table=nat:68 family=2 entries=35 op=nft_register_chain pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:55.008993 kubelet[1451]: E0513 00:40:55.008949 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:55.323000 audit[2046]: NETFILTER_CFG table=filter:69 family=2 entries=9 op=nft_register_rule pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:55.323000 audit[2046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffedd5acd0 a2=0 a3=1 items=0 ppid=1607 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:55.334000 audit[2046]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:55.334000 audit[2046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffedd5acd0 a2=0 a3=1 items=0 ppid=1607 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:55.450023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1996952743.mount: Deactivated successfully. May 13 00:40:55.646405 env[1207]: time="2025-05-13T00:40:55.646284604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.650243 env[1207]: time="2025-05-13T00:40:55.650195521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.661405 env[1207]: time="2025-05-13T00:40:55.661360074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.696380 env[1207]: time="2025-05-13T00:40:55.696325106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 13 00:40:55.696521 env[1207]: time="2025-05-13T00:40:55.696474693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:40:55.707400 env[1207]: time="2025-05-13T00:40:55.707355306Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:40:55.717173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3863307360.mount: Deactivated successfully. May 13 00:40:55.720188 env[1207]: time="2025-05-13T00:40:55.720144990Z" level=info msg="CreateContainer within sandbox \"1f4857db465f6e78a24f5f5ae1c3e2595187da0fabb367ea84f3e556abe180f9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e7e6af7413714f394a9e54c4b970ffd314ebe7e1d8cffd3dd740b55a9e12a71a\"" May 13 00:40:55.720737 env[1207]: time="2025-05-13T00:40:55.720690096Z" level=info msg="StartContainer for \"e7e6af7413714f394a9e54c4b970ffd314ebe7e1d8cffd3dd740b55a9e12a71a\"" May 13 00:40:55.742595 systemd[1]: Started cri-containerd-e7e6af7413714f394a9e54c4b970ffd314ebe7e1d8cffd3dd740b55a9e12a71a.scope. May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1521 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653661663734313337313466333934613965353463346239373066 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.759000 audit: BPF prog-id=78 op=LOAD May 13 00:40:55.759000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1521 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653661663734313337313466333934613965353463346239373066 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit: BPF prog-id=79 op=LOAD May 13 00:40:55.760000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1521 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653661663734313337313466333934613965353463346239373066 May 13 00:40:55.760000 audit: BPF prog-id=79 op=UNLOAD May 13 00:40:55.760000 audit: BPF prog-id=78 op=UNLOAD May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:55.760000 audit: BPF prog-id=80 op=LOAD May 13 00:40:55.760000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1521 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:55.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653661663734313337313466333934613965353463346239373066 May 13 00:40:55.777463 env[1207]: time="2025-05-13T00:40:55.777420364Z" level=info msg="StartContainer for \"e7e6af7413714f394a9e54c4b970ffd314ebe7e1d8cffd3dd740b55a9e12a71a\" returns successfully" May 13 00:40:55.969739 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:40:55.969962 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:40:56.009539 kubelet[1451]: E0513 00:40:56.009481 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:56.204734 kubelet[1451]: E0513 00:40:56.204705 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:56.218588 kubelet[1451]: I0513 00:40:56.218526 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6kpz6" podStartSLOduration=2.497058104 podStartE2EDuration="14.218503532s" podCreationTimestamp="2025-05-13 00:40:42 +0000 UTC" firstStartedPulling="2025-05-13 00:40:43.976133428 +0000 UTC m=+3.065788804" lastFinishedPulling="2025-05-13 00:40:55.697578815 +0000 UTC m=+14.787234232" observedRunningTime="2025-05-13 00:40:56.2183499 +0000 UTC m=+15.308005396" watchObservedRunningTime="2025-05-13 00:40:56.218503532 +0000 UTC m=+15.308158908" May 13 00:40:56.353000 audit[2115]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:56.353000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff92d4bd0 a2=0 a3=1 items=0 ppid=1607 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:56.366000 audit[2115]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:56.366000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=fffff92d4bd0 a2=0 a3=1 items=0 ppid=1607 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:56.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:57.010254 kubelet[1451]: E0513 00:40:57.010203 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:57.206226 kubelet[1451]: I0513 00:40:57.206192 1451 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:40:57.206943 kubelet[1451]: E0513 00:40:57.206616 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:57.228000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=12267 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.228000 audit[2185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc75cca1d a2=241 a3=1b6 items=1 ppid=2129 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.228000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:40:57.228000 audit: PATH item=0 name="/dev/fd/63" inode=12264 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.231000 audit[2191]: AVC avc: denied { write } for pid=2191 comm="tee" name="fd" dev="proc" ino=12271 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.231000 audit[2191]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffcfb5a2d a2=241 a3=1b6 items=1 ppid=2135 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.231000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:40:57.231000 audit: PATH item=0 name="/dev/fd/63" inode=15383 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.231000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.232000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=14649 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.232000 audit[2168]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd409aa2f a2=241 a3=1b6 items=1 ppid=2133 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.232000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:40:57.232000 audit: PATH item=0 name="/dev/fd/63" inode=14645 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.233000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=15389 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.233000 audit[2171]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0f06a1e a2=241 a3=1b6 items=1 ppid=2126 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.233000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:40:57.233000 audit: PATH item=0 name="/dev/fd/63" inode=14646 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.234000 audit[2183]: AVC avc: denied { write } for pid=2183 comm="tee" name="fd" dev="proc" ino=12273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.234000 audit[2183]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcfa98a2d a2=241 a3=1b6 items=1 ppid=2128 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.234000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:40:57.234000 audit: PATH item=0 name="/dev/fd/63" inode=14196 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.238000 audit[2196]: AVC avc: denied { write } for pid=2196 comm="tee" name="fd" dev="proc" ino=15393 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.238000 audit[2196]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2c94a2d a2=241 a3=1b6 items=1 ppid=2132 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.238000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:40:57.238000 audit: PATH item=0 name="/dev/fd/63" inode=15386 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.238000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.267000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=15398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:40:57.267000 audit[2206]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd504ca2e a2=241 a3=1b6 items=1 ppid=2125 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.267000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:40:57.267000 audit: PATH item=0 name="/dev/fd/63" inode=14201 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:40:57.267000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.330000 audit: BPF prog-id=81 op=LOAD May 13 00:40:57.330000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffde1de18 a2=98 a3=fffffde1de08 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.330000 audit: BPF prog-id=81 op=UNLOAD May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit: BPF prog-id=82 op=LOAD May 13 00:40:57.331000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffde1daa8 a2=74 a3=95 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.331000 audit: BPF prog-id=82 op=UNLOAD May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.331000 audit: BPF prog-id=83 op=LOAD May 13 00:40:57.331000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffde1db08 a2=94 a3=2 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.332000 audit: BPF prog-id=83 op=UNLOAD May 13 00:40:57.416000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.416000 audit: BPF prog-id=84 op=LOAD May 13 00:40:57.416000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffde1dac8 a2=40 a3=fffffde1daf8 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.416000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.417000 audit: BPF prog-id=84 op=UNLOAD May 13 00:40:57.417000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.417000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffde1dbe0 a2=50 a3=0 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.427000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.427000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1db38 a2=28 a3=fffffde1dc68 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.427000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.428000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.428000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffde1db68 a2=28 a3=fffffde1dc98 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.428000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.428000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.428000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffde1da18 a2=28 a3=fffffde1db48 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.428000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.428000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.428000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1db88 a2=28 a3=fffffde1dcb8 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.428000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.428000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.428000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1db68 a2=28 a3=fffffde1dc98 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.428000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.429000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.429000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1db58 a2=28 a3=fffffde1dc88 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.429000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.429000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.429000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1db88 a2=28 a3=fffffde1dcb8 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.429000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.429000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.429000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffde1db68 a2=28 a3=fffffde1dc98 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.429000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.429000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.429000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffde1db88 a2=28 a3=fffffde1dcb8 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.429000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.429000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.429000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffde1db58 a2=28 a3=fffffde1dc88 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.429000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.430000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffde1dbd8 a2=28 a3=fffffde1dd18 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.430000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffde1d910 a2=50 a3=0 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.430000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.430000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.430000 audit: BPF prog-id=85 op=LOAD May 13 00:40:57.430000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffde1d918 a2=94 a3=5 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.430000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.431000 audit: BPF prog-id=85 op=UNLOAD May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffde1da20 a2=50 a3=0 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.431000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.431000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffde1db68 a2=4 a3=3 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.431000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.431000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.431000 audit[2244]: AVC avc: denied { confidentiality } for pid=2244 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.431000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffde1db48 a2=94 a3=6 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.431000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.432000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.432000 audit[2244]: AVC avc: denied { confidentiality } for pid=2244 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.432000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffde1d318 a2=94 a3=83 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.432000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.433000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.433000 audit[2244]: AVC avc: denied { confidentiality } for pid=2244 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.433000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffde1d318 a2=94 a3=83 items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.433000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit: BPF prog-id=86 op=LOAD May 13 00:40:57.446000 audit[2247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd24da9a8 a2=98 a3=ffffd24da998 items=0 ppid=2131 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:57.446000 audit: BPF prog-id=86 op=UNLOAD May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit: BPF prog-id=87 op=LOAD May 13 00:40:57.446000 audit[2247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd24da858 a2=74 a3=95 items=0 ppid=2131 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:57.446000 audit: BPF prog-id=87 op=UNLOAD May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.446000 audit: BPF prog-id=88 op=LOAD May 13 00:40:57.446000 audit[2247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd24da888 a2=40 a3=ffffd24da8b8 items=0 ppid=2131 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:40:57.446000 audit: BPF prog-id=88 op=UNLOAD May 13 00:40:57.491390 systemd-networkd[1040]: vxlan.calico: Link UP May 13 00:40:57.491398 systemd-networkd[1040]: vxlan.calico: Gained carrier May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit: BPF prog-id=89 op=LOAD May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffedac68 a2=98 a3=ffffffedac58 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit: BPF prog-id=89 op=UNLOAD May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit: BPF prog-id=90 op=LOAD May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffeda948 a2=74 a3=95 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit: BPF prog-id=90 op=UNLOAD May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit: BPF prog-id=91 op=LOAD May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffeda9a8 a2=94 a3=2 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit: BPF prog-id=91 op=UNLOAD May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffeda9d8 a2=28 a3=ffffffedab08 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffffedaa08 a2=28 a3=ffffffedab38 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffffeda8b8 a2=28 a3=ffffffeda9e8 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffedaa28 a2=28 a3=ffffffedab58 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffedaa08 a2=28 a3=ffffffedab38 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.507000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.507000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffeda9f8 a2=28 a3=ffffffedab28 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffedaa28 a2=28 a3=ffffffedab58 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffffedaa08 a2=28 a3=ffffffedab38 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffffedaa28 a2=28 a3=ffffffedab58 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffffeda9f8 a2=28 a3=ffffffedab28 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffffedaa78 a2=28 a3=ffffffedabb8 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit: BPF prog-id=92 op=LOAD May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffffeda898 a2=40 a3=ffffffeda8c8 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit: BPF prog-id=92 op=UNLOAD May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffffeda8c0 a2=50 a3=0 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffffeda8c0 a2=50 a3=0 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit: BPF prog-id=93 op=LOAD May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffffeda028 a2=94 a3=2 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.508000 audit: BPF prog-id=93 op=UNLOAD May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.508000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffffeda1b8 a2=94 a3=30 items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit: BPF prog-id=95 op=LOAD May 13 00:40:57.512000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc3223608 a2=98 a3=ffffc32235f8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.512000 audit: BPF prog-id=95 op=UNLOAD May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit: BPF prog-id=96 op=LOAD May 13 00:40:57.512000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3223298 a2=74 a3=95 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.512000 audit: BPF prog-id=96 op=UNLOAD May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.512000 audit: BPF prog-id=97 op=LOAD May 13 00:40:57.512000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc32232f8 a2=94 a3=2 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.512000 audit: BPF prog-id=97 op=UNLOAD May 13 00:40:57.596000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.596000 audit: BPF prog-id=98 op=LOAD May 13 00:40:57.596000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc32232b8 a2=40 a3=ffffc32232e8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.596000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.597000 audit: BPF prog-id=98 op=UNLOAD May 13 00:40:57.597000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.597000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc32233d0 a2=50 a3=0 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.597000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3223328 a2=28 a3=ffffc3223458 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3223358 a2=28 a3=ffffc3223488 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3223208 a2=28 a3=ffffc3223338 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3223378 a2=28 a3=ffffc32234a8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3223358 a2=28 a3=ffffc3223488 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3223348 a2=28 a3=ffffc3223478 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3223378 a2=28 a3=ffffc32234a8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3223358 a2=28 a3=ffffc3223488 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3223378 a2=28 a3=ffffc32234a8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3223348 a2=28 a3=ffffc3223478 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc32233c8 a2=28 a3=ffffc3223508 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3223100 a2=50 a3=0 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit: BPF prog-id=99 op=LOAD May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc3223108 a2=94 a3=5 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit: BPF prog-id=99 op=UNLOAD May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3223210 a2=50 a3=0 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc3223358 a2=4 a3=3 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.605000 audit[2279]: AVC avc: denied { confidentiality } for pid=2279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.605000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3223338 a2=94 a3=6 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { confidentiality } for pid=2279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.606000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3222b08 a2=94 a3=83 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { confidentiality } for pid=2279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:40:57.606000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3222b08 a2=94 a3=83 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.606000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.606000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3224548 a2=10 a3=ffffc3224638 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.607000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.607000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3224408 a2=10 a3=ffffc32244f8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.607000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.607000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3224378 a2=10 a3=ffffc32244f8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.607000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:40:57.607000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3224378 a2=10 a3=ffffc32244f8 items=0 ppid=2131 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:40:57.617000 audit: BPF prog-id=94 op=UNLOAD May 13 00:40:57.669000 audit[2305]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:57.669000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc62e0ad0 a2=0 a3=ffff7f8e7fa8 items=0 ppid=2131 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:57.677000 audit[2308]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:57.677000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff49e21b0 a2=0 a3=ffff8dda0fa8 items=0 ppid=2131 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.677000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:57.678000 audit[2307]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:57.678000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc3838120 a2=0 a3=ffffb1cabfa8 items=0 ppid=2131 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:57.682000 audit[2306]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:40:57.682000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffaeea120 a2=0 a3=ffff9fb6dfa8 items=0 ppid=2131 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:57.682000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:40:58.010545 kubelet[1451]: E0513 00:40:58.010425 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:40:58.608196 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL May 13 00:40:59.010626 kubelet[1451]: E0513 00:40:59.010509 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:00.010836 kubelet[1451]: E0513 00:41:00.010777 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:01.011861 kubelet[1451]: E0513 00:41:01.011817 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:02.002001 kubelet[1451]: E0513 00:41:02.001951 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:02.012207 kubelet[1451]: E0513 00:41:02.012180 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:03.012583 kubelet[1451]: E0513 00:41:03.012540 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:03.328751 kubelet[1451]: I0513 00:41:03.328441 1451 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:41:03.329300 kubelet[1451]: E0513 00:41:03.329272 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:03.415547 systemd[1]: run-containerd-runc-k8s.io-e7e6af7413714f394a9e54c4b970ffd314ebe7e1d8cffd3dd740b55a9e12a71a-runc.oy6Zbv.mount: Deactivated successfully. May 13 00:41:04.013445 kubelet[1451]: E0513 00:41:04.013384 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:04.218622 kubelet[1451]: E0513 00:41:04.218218 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:41:05.014153 kubelet[1451]: E0513 00:41:05.014092 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:06.015141 kubelet[1451]: E0513 00:41:06.015084 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:07.015494 kubelet[1451]: E0513 00:41:07.015458 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:08.016152 kubelet[1451]: E0513 00:41:08.016117 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:08.177495 env[1207]: time="2025-05-13T00:41:08.177450506Z" level=info msg="StopPodSandbox for \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\"" May 13 00:41:08.177820 env[1207]: time="2025-05-13T00:41:08.177507906Z" level=info msg="StopPodSandbox for \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\"" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.227 [INFO][2416] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.228 [INFO][2416] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" iface="eth0" netns="/var/run/netns/cni-32c4bd34-a6be-a0e1-96db-ef0281cbb3b5" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.228 [INFO][2416] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" iface="eth0" netns="/var/run/netns/cni-32c4bd34-a6be-a0e1-96db-ef0281cbb3b5" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.228 [INFO][2416] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" iface="eth0" netns="/var/run/netns/cni-32c4bd34-a6be-a0e1-96db-ef0281cbb3b5" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.228 [INFO][2416] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.228 [INFO][2416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.297 [INFO][2434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" HandleID="k8s-pod-network.35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.297 [INFO][2434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.297 [INFO][2434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.307 [WARNING][2434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" HandleID="k8s-pod-network.35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.307 [INFO][2434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" HandleID="k8s-pod-network.35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.308 [INFO][2434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:08.311631 env[1207]: 2025-05-13 00:41:08.310 [INFO][2416] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a" May 13 00:41:08.313054 systemd[1]: run-netns-cni\x2d32c4bd34\x2da6be\x2da0e1\x2d96db\x2def0281cbb3b5.mount: Deactivated successfully. May 13 00:41:08.313835 env[1207]: time="2025-05-13T00:41:08.313796434Z" level=info msg="TearDown network for sandbox \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\" successfully" May 13 00:41:08.313895 env[1207]: time="2025-05-13T00:41:08.313834941Z" level=info msg="StopPodSandbox for \"35875040db9365bb1535500414e41e02967460d4ef7483439dc6e09f01dfc44a\" returns successfully" May 13 00:41:08.314524 env[1207]: time="2025-05-13T00:41:08.314495397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lpbrl,Uid:da41ebf0-ccc3-4206-9556-846a7f0d2534,Namespace:calico-system,Attempt:1,}" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.226 [INFO][2417] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.226 [INFO][2417] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" iface="eth0" netns="/var/run/netns/cni-92270c8b-06a6-c177-9250-96be15e60976" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.226 [INFO][2417] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" iface="eth0" netns="/var/run/netns/cni-92270c8b-06a6-c177-9250-96be15e60976" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.226 [INFO][2417] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" iface="eth0" netns="/var/run/netns/cni-92270c8b-06a6-c177-9250-96be15e60976" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.227 [INFO][2417] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.227 [INFO][2417] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.297 [INFO][2432] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" HandleID="k8s-pod-network.899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.297 [INFO][2432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.309 [INFO][2432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.317 [WARNING][2432] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" HandleID="k8s-pod-network.899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.317 [INFO][2432] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" HandleID="k8s-pod-network.899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.319 [INFO][2432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:08.322407 env[1207]: 2025-05-13 00:41:08.320 [INFO][2417] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64" May 13 00:41:08.323946 systemd[1]: run-netns-cni\x2d92270c8b\x2d06a6\x2dc177\x2d9250\x2d96be15e60976.mount: Deactivated successfully. May 13 00:41:08.327114 env[1207]: time="2025-05-13T00:41:08.326543285Z" level=info msg="TearDown network for sandbox \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\" successfully" May 13 00:41:08.327114 env[1207]: time="2025-05-13T00:41:08.326586115Z" level=info msg="StopPodSandbox for \"899022f3ce929434646fd08d22c154e1db6f80827e59ef3adb89221fea363c64\" returns successfully" May 13 00:41:08.327503 env[1207]: time="2025-05-13T00:41:08.327477371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-w7p6k,Uid:26a8055a-a641-4717-96cb-afd9f06212eb,Namespace:default,Attempt:1,}" May 13 00:41:08.428801 systemd-networkd[1040]: cali6e76fa3c010: Link UP May 13 00:41:08.430112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:41:08.430206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e76fa3c010: link becomes ready May 13 00:41:08.430342 systemd-networkd[1040]: cali6e76fa3c010: Gained carrier May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.360 [INFO][2449] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.138-k8s-csi--node--driver--lpbrl-eth0 csi-node-driver- calico-system da41ebf0-ccc3-4206-9556-846a7f0d2534 1005 0 2025-05-13 00:40:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.138 csi-node-driver-lpbrl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6e76fa3c010 [] []}} ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.360 [INFO][2449] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.389 [INFO][2478] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" HandleID="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.400 [INFO][2478] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" HandleID="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002db710), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.138", "pod":"csi-node-driver-lpbrl", "timestamp":"2025-05-13 00:41:08.389923416 +0000 UTC"}, Hostname:"10.0.0.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.400 [INFO][2478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.401 [INFO][2478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.401 [INFO][2478] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.138' May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.402 [INFO][2478] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.406 [INFO][2478] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.410 [INFO][2478] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.412 [INFO][2478] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.414 [INFO][2478] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.414 [INFO][2478] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.415 [INFO][2478] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1 May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.418 [INFO][2478] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.423 [INFO][2478] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.65/26] block=192.168.97.64/26 handle="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.423 [INFO][2478] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.65/26] handle="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" host="10.0.0.138" May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.423 [INFO][2478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:08.442401 env[1207]: 2025-05-13 00:41:08.424 [INFO][2478] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.65/26] IPv6=[] ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" HandleID="k8s-pod-network.0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Workload="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.425 [INFO][2449] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-csi--node--driver--lpbrl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da41ebf0-ccc3-4206-9556-846a7f0d2534", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"", Pod:"csi-node-driver-lpbrl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e76fa3c010", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.425 [INFO][2449] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.65/32] ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.425 [INFO][2449] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6e76fa3c010 ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.431 [INFO][2449] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.431 [INFO][2449] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-csi--node--driver--lpbrl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da41ebf0-ccc3-4206-9556-846a7f0d2534", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1", Pod:"csi-node-driver-lpbrl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e76fa3c010", MAC:"6a:58:69:ff:62:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:08.443006 env[1207]: 2025-05-13 00:41:08.440 [INFO][2449] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1" Namespace="calico-system" Pod="csi-node-driver-lpbrl" WorkloadEndpoint="10.0.0.138-k8s-csi--node--driver--lpbrl-eth0" May 13 00:41:08.450000 audit[2510]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:41:08.452578 kernel: kauditd_printk_skb: 580 callbacks suppressed May 13 00:41:08.452635 kernel: audit: type=1325 audit(1747096868.450:644): table=filter:77 family=2 entries=34 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:41:08.450000 audit[2510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdccd7e70 a2=0 a3=ffff84173fa8 items=0 ppid=2131 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.458100 kernel: audit: type=1300 audit(1747096868.450:644): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdccd7e70 a2=0 a3=ffff84173fa8 items=0 ppid=2131 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.458159 kernel: audit: type=1327 audit(1747096868.450:644): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:41:08.450000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:41:08.458595 env[1207]: time="2025-05-13T00:41:08.458526037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:41:08.458595 env[1207]: time="2025-05-13T00:41:08.458565585Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:41:08.458747 env[1207]: time="2025-05-13T00:41:08.458575792Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:41:08.458947 env[1207]: time="2025-05-13T00:41:08.458910063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1 pid=2518 runtime=io.containerd.runc.v2 May 13 00:41:08.469486 systemd[1]: Started cri-containerd-0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1.scope. May 13 00:41:08.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.497072 kernel: audit: type=1400 audit(1747096868.491:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.497145 kernel: audit: type=1400 audit(1747096868.491:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.497171 kernel: audit: type=1400 audit(1747096868.491:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.501608 kernel: audit: type=1400 audit(1747096868.491:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.501649 kernel: audit: type=1400 audit(1747096868.491:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.506554 kernel: audit: type=1400 audit(1747096868.491:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.506655 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:41:08.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.509214 kernel: audit: type=1400 audit(1747096868.491:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.493000 audit: BPF prog-id=100 op=LOAD May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2518 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031323761346338663135323039616230333664343138656237643262 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2518 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031323761346338663135323039616230333664343138656237643262 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.494000 audit: BPF prog-id=101 op=LOAD May 13 00:41:08.494000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2518 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031323761346338663135323039616230333664343138656237643262 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.496000 audit: BPF prog-id=102 op=LOAD May 13 00:41:08.496000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2518 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031323761346338663135323039616230333664343138656237643262 May 13 00:41:08.498000 audit: BPF prog-id=102 op=UNLOAD May 13 00:41:08.498000 audit: BPF prog-id=101 op=UNLOAD May 13 00:41:08.498000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.498000 audit: BPF prog-id=103 op=LOAD May 13 00:41:08.498000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2518 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031323761346338663135323039616230333664343138656237643262 May 13 00:41:08.519765 env[1207]: time="2025-05-13T00:41:08.519719137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lpbrl,Uid:da41ebf0-ccc3-4206-9556-846a7f0d2534,Namespace:calico-system,Attempt:1,} returns sandbox id \"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1\"" May 13 00:41:08.521529 env[1207]: time="2025-05-13T00:41:08.521496565Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:41:08.535091 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7f82c8be57: link becomes ready May 13 00:41:08.532950 systemd-networkd[1040]: calie7f82c8be57: Link UP May 13 00:41:08.533625 systemd-networkd[1040]: calie7f82c8be57: Gained carrier May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.370 [INFO][2460] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0 nginx-deployment-7fcdb87857- default 26a8055a-a641-4717-96cb-afd9f06212eb 1004 0 2025-05-13 00:40:53 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.138 nginx-deployment-7fcdb87857-w7p6k eth0 default [] [] [kns.default ksa.default.default] calie7f82c8be57 [] []}} ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.370 [INFO][2460] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.395 [INFO][2484] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" HandleID="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.407 [INFO][2484] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" HandleID="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000278fe0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.138", "pod":"nginx-deployment-7fcdb87857-w7p6k", "timestamp":"2025-05-13 00:41:08.395709936 +0000 UTC"}, Hostname:"10.0.0.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.407 [INFO][2484] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.423 [INFO][2484] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.424 [INFO][2484] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.138' May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.503 [INFO][2484] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.509 [INFO][2484] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.514 [INFO][2484] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.515 [INFO][2484] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.517 [INFO][2484] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.517 [INFO][2484] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.520 [INFO][2484] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.523 [INFO][2484] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.529 [INFO][2484] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.66/26] block=192.168.97.64/26 handle="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.529 [INFO][2484] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.66/26] handle="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" host="10.0.0.138" May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.529 [INFO][2484] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:08.541210 env[1207]: 2025-05-13 00:41:08.529 [INFO][2484] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.66/26] IPv6=[] ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" HandleID="k8s-pod-network.afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Workload="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.531 [INFO][2460] cni-plugin/k8s.go 386: Populated endpoint ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"26a8055a-a641-4717-96cb-afd9f06212eb", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-w7p6k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie7f82c8be57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.531 [INFO][2460] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.66/32] ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.531 [INFO][2460] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie7f82c8be57 ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.533 [INFO][2460] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.533 [INFO][2460] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"26a8055a-a641-4717-96cb-afd9f06212eb", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c", Pod:"nginx-deployment-7fcdb87857-w7p6k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie7f82c8be57", MAC:"36:4c:3c:9d:01:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:08.541697 env[1207]: 2025-05-13 00:41:08.538 [INFO][2460] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c" Namespace="default" Pod="nginx-deployment-7fcdb87857-w7p6k" WorkloadEndpoint="10.0.0.138-k8s-nginx--deployment--7fcdb87857--w7p6k-eth0" May 13 00:41:08.547000 audit[2560]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:41:08.547000 audit[2560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffc91ea2a0 a2=0 a3=ffff94808fa8 items=0 ppid=2131 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:41:08.556539 env[1207]: time="2025-05-13T00:41:08.556469500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:41:08.556539 env[1207]: time="2025-05-13T00:41:08.556509768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:41:08.556539 env[1207]: time="2025-05-13T00:41:08.556520375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:41:08.556684 env[1207]: time="2025-05-13T00:41:08.556643260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c pid=2574 runtime=io.containerd.runc.v2 May 13 00:41:08.566212 systemd[1]: Started cri-containerd-afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c.scope. May 13 00:41:08.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.595000 audit: BPF prog-id=104 op=LOAD May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2574 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613835343461393733633162343637343537353938306335363162 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2574 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613835343461393733633162343637343537353938306335363162 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit: BPF prog-id=105 op=LOAD May 13 00:41:08.596000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2574 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613835343461393733633162343637343537353938306335363162 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit: BPF prog-id=106 op=LOAD May 13 00:41:08.596000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2574 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613835343461393733633162343637343537353938306335363162 May 13 00:41:08.596000 audit: BPF prog-id=106 op=UNLOAD May 13 00:41:08.596000 audit: BPF prog-id=105 op=UNLOAD May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:08.596000 audit: BPF prog-id=107 op=LOAD May 13 00:41:08.596000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2574 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:08.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613835343461393733633162343637343537353938306335363162 May 13 00:41:08.597802 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:41:08.612452 env[1207]: time="2025-05-13T00:41:08.612411930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-w7p6k,Uid:26a8055a-a641-4717-96cb-afd9f06212eb,Namespace:default,Attempt:1,} returns sandbox id \"afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c\"" May 13 00:41:09.016838 kubelet[1451]: E0513 00:41:09.016691 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:09.417158 env[1207]: time="2025-05-13T00:41:09.417037315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:09.419705 env[1207]: time="2025-05-13T00:41:09.419679521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:09.422152 env[1207]: time="2025-05-13T00:41:09.422123357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:09.424178 env[1207]: time="2025-05-13T00:41:09.424144757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:09.424522 env[1207]: time="2025-05-13T00:41:09.424496707Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 13 00:41:09.426459 env[1207]: time="2025-05-13T00:41:09.426435293Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:41:09.427107 env[1207]: time="2025-05-13T00:41:09.427059621Z" level=info msg="CreateContainer within sandbox \"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:41:09.438390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2337414282.mount: Deactivated successfully. May 13 00:41:09.444232 env[1207]: time="2025-05-13T00:41:09.444184206Z" level=info msg="CreateContainer within sandbox \"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ec6c4958b8cffdef3a097bfcc479961cc3cbb69b1ece01b803a1a51703a6ed6d\"" May 13 00:41:09.445120 env[1207]: time="2025-05-13T00:41:09.445038084Z" level=info msg="StartContainer for \"ec6c4958b8cffdef3a097bfcc479961cc3cbb69b1ece01b803a1a51703a6ed6d\"" May 13 00:41:09.464466 systemd[1]: Started cri-containerd-ec6c4958b8cffdef3a097bfcc479961cc3cbb69b1ece01b803a1a51703a6ed6d.scope. May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2518 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563366334393538623863666664656633613039376266636334373939 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.487000 audit: BPF prog-id=108 op=LOAD May 13 00:41:09.487000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2518 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563366334393538623863666664656633613039376266636334373939 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.488000 audit: BPF prog-id=109 op=LOAD May 13 00:41:09.488000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2518 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563366334393538623863666664656633613039376266636334373939 May 13 00:41:09.489000 audit: BPF prog-id=109 op=UNLOAD May 13 00:41:09.489000 audit: BPF prog-id=108 op=UNLOAD May 13 00:41:09.489000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:09.489000 audit: BPF prog-id=110 op=LOAD May 13 00:41:09.489000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2518 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:09.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563366334393538623863666664656633613039376266636334373939 May 13 00:41:09.504286 env[1207]: time="2025-05-13T00:41:09.504238950Z" level=info msg="StartContainer for \"ec6c4958b8cffdef3a097bfcc479961cc3cbb69b1ece01b803a1a51703a6ed6d\" returns successfully" May 13 00:41:09.936320 systemd-networkd[1040]: cali6e76fa3c010: Gained IPv6LL May 13 00:41:10.017871 kubelet[1451]: E0513 00:41:10.017817 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:10.313335 systemd[1]: run-containerd-runc-k8s.io-ec6c4958b8cffdef3a097bfcc479961cc3cbb69b1ece01b803a1a51703a6ed6d-runc.Qxc7nB.mount: Deactivated successfully. May 13 00:41:10.448344 systemd-networkd[1040]: calie7f82c8be57: Gained IPv6LL May 13 00:41:11.018377 kubelet[1451]: E0513 00:41:11.018332 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:11.757952 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3278134908.mount: Deactivated successfully. May 13 00:41:12.018845 kubelet[1451]: E0513 00:41:12.018743 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:12.911627 env[1207]: time="2025-05-13T00:41:12.911580689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:12.913237 env[1207]: time="2025-05-13T00:41:12.913206988Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:12.914982 env[1207]: time="2025-05-13T00:41:12.914950711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:12.916734 env[1207]: time="2025-05-13T00:41:12.916701679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:12.917559 env[1207]: time="2025-05-13T00:41:12.917526975Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 13 00:41:12.919538 env[1207]: time="2025-05-13T00:41:12.919504507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:41:12.920213 env[1207]: time="2025-05-13T00:41:12.920179640Z" level=info msg="CreateContainer within sandbox \"afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 13 00:41:12.929471 env[1207]: time="2025-05-13T00:41:12.929434754Z" level=info msg="CreateContainer within sandbox \"afa8544a973c1b4674575980c561bc7f92a2ef6ab5c9704d752f664dda4e2c8c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7e8aeebbdd63da03e921de46bf1e49449dc0e3d493f98ed99662acfefb7be140\"" May 13 00:41:12.929861 env[1207]: time="2025-05-13T00:41:12.929831333Z" level=info msg="StartContainer for \"7e8aeebbdd63da03e921de46bf1e49449dc0e3d493f98ed99662acfefb7be140\"" May 13 00:41:12.947472 systemd[1]: Started cri-containerd-7e8aeebbdd63da03e921de46bf1e49449dc0e3d493f98ed99662acfefb7be140.scope. May 13 00:41:12.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit: BPF prog-id=111 op=LOAD May 13 00:41:12.983000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.983000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2574 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:12.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386165656262646436336461303365393231646534366266316534 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2574 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:12.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386165656262646436336461303365393231646534366266316534 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit: BPF prog-id=112 op=LOAD May 13 00:41:12.984000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2574 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:12.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386165656262646436336461303365393231646534366266316534 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit: BPF prog-id=113 op=LOAD May 13 00:41:12.984000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2574 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:12.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386165656262646436336461303365393231646534366266316534 May 13 00:41:12.984000 audit: BPF prog-id=113 op=UNLOAD May 13 00:41:12.984000 audit: BPF prog-id=112 op=UNLOAD May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:12.984000 audit: BPF prog-id=114 op=LOAD May 13 00:41:12.984000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2574 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:12.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386165656262646436336461303365393231646534366266316534 May 13 00:41:12.995657 env[1207]: time="2025-05-13T00:41:12.995618124Z" level=info msg="StartContainer for \"7e8aeebbdd63da03e921de46bf1e49449dc0e3d493f98ed99662acfefb7be140\" returns successfully" May 13 00:41:13.019746 kubelet[1451]: E0513 00:41:13.019508 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:14.020441 kubelet[1451]: E0513 00:41:14.020399 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:14.031341 env[1207]: time="2025-05-13T00:41:14.031291483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:14.033052 env[1207]: time="2025-05-13T00:41:14.033011695Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:14.035078 env[1207]: time="2025-05-13T00:41:14.035040540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:14.036298 env[1207]: time="2025-05-13T00:41:14.036247418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:14.036793 env[1207]: time="2025-05-13T00:41:14.036766516Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 13 00:41:14.040032 env[1207]: time="2025-05-13T00:41:14.039987432Z" level=info msg="CreateContainer within sandbox \"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:41:14.052154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1489065249.mount: Deactivated successfully. May 13 00:41:14.055054 env[1207]: time="2025-05-13T00:41:14.055017319Z" level=info msg="CreateContainer within sandbox \"0127a4c8f15209ab036d418eb7d2bef00ece73b6f01569a95606b7c35b2882f1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6db5e4fa7bf489fdfc5f99b483cb3e6fbf17174546307c1e550f0c28b4e2b991\"" May 13 00:41:14.055702 env[1207]: time="2025-05-13T00:41:14.055674565Z" level=info msg="StartContainer for \"6db5e4fa7bf489fdfc5f99b483cb3e6fbf17174546307c1e550f0c28b4e2b991\"" May 13 00:41:14.079355 systemd[1]: run-containerd-runc-k8s.io-6db5e4fa7bf489fdfc5f99b483cb3e6fbf17174546307c1e550f0c28b4e2b991-runc.0Z8hPQ.mount: Deactivated successfully. May 13 00:41:14.087354 systemd[1]: Started cri-containerd-6db5e4fa7bf489fdfc5f99b483cb3e6fbf17174546307c1e550f0c28b4e2b991.scope. May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.122787 kernel: kauditd_printk_skb: 210 callbacks suppressed May 13 00:41:14.122842 kernel: audit: type=1400 audit(1747096874.118:706): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2518 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.132739 kernel: audit: type=1300 audit(1747096874.118:706): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2518 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.132808 kernel: audit: type=1327 audit(1747096874.118:706): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623565346661376266343839666466633566393962343833636233 May 13 00:41:14.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623565346661376266343839666466633566393962343833636233 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.139708 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.139785 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.149176 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.149254 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.154084 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.161035 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.164642 kernel: audit: type=1400 audit(1747096874.118:707): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.118000 audit: BPF prog-id=115 op=LOAD May 13 00:41:14.118000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2518 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623565346661376266343839666466633566393962343833636233 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.126000 audit: BPF prog-id=116 op=LOAD May 13 00:41:14.126000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2518 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623565346661376266343839666466633566393962343833636233 May 13 00:41:14.134000 audit: BPF prog-id=116 op=UNLOAD May 13 00:41:14.134000 audit: BPF prog-id=115 op=UNLOAD May 13 00:41:14.134000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:14.134000 audit: BPF prog-id=117 op=LOAD May 13 00:41:14.134000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2518 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664623565346661376266343839666466633566393962343833636233 May 13 00:41:14.166456 env[1207]: time="2025-05-13T00:41:14.166415079Z" level=info msg="StartContainer for \"6db5e4fa7bf489fdfc5f99b483cb3e6fbf17174546307c1e550f0c28b4e2b991\" returns successfully" May 13 00:41:14.253550 kubelet[1451]: I0513 00:41:14.253310 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-lpbrl" podStartSLOduration=26.735723993 podStartE2EDuration="32.253291287s" podCreationTimestamp="2025-05-13 00:40:42 +0000 UTC" firstStartedPulling="2025-05-13 00:41:08.521064066 +0000 UTC m=+27.610719482" lastFinishedPulling="2025-05-13 00:41:14.03863136 +0000 UTC m=+33.128286776" observedRunningTime="2025-05-13 00:41:14.253231217 +0000 UTC m=+33.342886633" watchObservedRunningTime="2025-05-13 00:41:14.253291287 +0000 UTC m=+33.342946703" May 13 00:41:14.253550 kubelet[1451]: I0513 00:41:14.253447 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-w7p6k" podStartSLOduration=16.947995795 podStartE2EDuration="21.253440721s" podCreationTimestamp="2025-05-13 00:40:53 +0000 UTC" firstStartedPulling="2025-05-13 00:41:08.613427392 +0000 UTC m=+27.703082888" lastFinishedPulling="2025-05-13 00:41:12.918872438 +0000 UTC m=+32.008527814" observedRunningTime="2025-05-13 00:41:13.245237703 +0000 UTC m=+32.334893119" watchObservedRunningTime="2025-05-13 00:41:14.253440721 +0000 UTC m=+33.343096137" May 13 00:41:15.021267 kubelet[1451]: E0513 00:41:15.021211 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:15.150687 kubelet[1451]: I0513 00:41:15.150654 1451 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:41:15.150834 kubelet[1451]: I0513 00:41:15.150699 1451 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:41:15.702000 audit[2740]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.702000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd797cca0 a2=0 a3=1 items=0 ppid=1607 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.713000 audit[2740]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.713000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd797cca0 a2=0 a3=1 items=0 ppid=1607 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.730000 audit[2742]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.730000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffde7e8d20 a2=0 a3=1 items=0 ppid=1607 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.738000 audit[2742]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:15.738000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffde7e8d20 a2=0 a3=1 items=0 ppid=1607 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:15.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:15.742386 systemd[1]: Created slice kubepods-besteffort-pod42f024f2_f442_41d5_b159_8fcad2ead625.slice. May 13 00:41:15.827970 kubelet[1451]: I0513 00:41:15.827925 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/42f024f2-f442-41d5-b159-8fcad2ead625-data\") pod \"nfs-server-provisioner-0\" (UID: \"42f024f2-f442-41d5-b159-8fcad2ead625\") " pod="default/nfs-server-provisioner-0" May 13 00:41:15.827970 kubelet[1451]: I0513 00:41:15.827968 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5jh4\" (UniqueName: \"kubernetes.io/projected/42f024f2-f442-41d5-b159-8fcad2ead625-kube-api-access-z5jh4\") pod \"nfs-server-provisioner-0\" (UID: \"42f024f2-f442-41d5-b159-8fcad2ead625\") " pod="default/nfs-server-provisioner-0" May 13 00:41:16.021586 kubelet[1451]: E0513 00:41:16.021487 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:16.045625 env[1207]: time="2025-05-13T00:41:16.045567522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:42f024f2-f442-41d5-b159-8fcad2ead625,Namespace:default,Attempt:0,}" May 13 00:41:16.173001 systemd-networkd[1040]: cali60e51b789ff: Link UP May 13 00:41:16.174749 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:41:16.174921 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 13 00:41:16.174938 systemd-networkd[1040]: cali60e51b789ff: Gained carrier May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.087 [INFO][2746] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.138-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 42f024f2-f442-41d5-b159-8fcad2ead625 1064 0 2025-05-13 00:41:15 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.138 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.087 [INFO][2746] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.124 [INFO][2762] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" HandleID="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Workload="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.135 [INFO][2762] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" HandleID="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Workload="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400034f520), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.138", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-13 00:41:16.124224075 +0000 UTC"}, Hostname:"10.0.0.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.135 [INFO][2762] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.136 [INFO][2762] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.136 [INFO][2762] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.138' May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.138 [INFO][2762] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.141 [INFO][2762] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.146 [INFO][2762] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.148 [INFO][2762] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.150 [INFO][2762] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.150 [INFO][2762] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.157 [INFO][2762] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.161 [INFO][2762] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.167 [INFO][2762] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.67/26] block=192.168.97.64/26 handle="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.167 [INFO][2762] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.67/26] handle="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" host="10.0.0.138" May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.167 [INFO][2762] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:16.195749 env[1207]: 2025-05-13 00:41:16.167 [INFO][2762] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.67/26] IPv6=[] ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" HandleID="k8s-pod-network.831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Workload="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.196517 env[1207]: 2025-05-13 00:41:16.169 [INFO][2746] cni-plugin/k8s.go 386: Populated endpoint ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"42f024f2-f442-41d5-b159-8fcad2ead625", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.196517 env[1207]: 2025-05-13 00:41:16.169 [INFO][2746] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.67/32] ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.196517 env[1207]: 2025-05-13 00:41:16.169 [INFO][2746] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.196517 env[1207]: 2025-05-13 00:41:16.176 [INFO][2746] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.196659 env[1207]: 2025-05-13 00:41:16.178 [INFO][2746] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"42f024f2-f442-41d5-b159-8fcad2ead625", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6a:98:0b:a5:93:0b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:16.196659 env[1207]: 2025-05-13 00:41:16.191 [INFO][2746] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.138-k8s-nfs--server--provisioner--0-eth0" May 13 00:41:16.204000 audit[2788]: NETFILTER_CFG table=filter:83 family=2 entries=44 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:41:16.204000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22672 a0=3 a1=ffffff7f0250 a2=0 a3=ffff86899fa8 items=0 ppid=2131 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.204000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:41:16.206733 env[1207]: time="2025-05-13T00:41:16.206666633Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:41:16.206822 env[1207]: time="2025-05-13T00:41:16.206748990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:41:16.206822 env[1207]: time="2025-05-13T00:41:16.206775482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:41:16.207164 env[1207]: time="2025-05-13T00:41:16.207100947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b pid=2796 runtime=io.containerd.runc.v2 May 13 00:41:16.224899 systemd[1]: Started cri-containerd-831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b.scope. May 13 00:41:16.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit: BPF prog-id=118 op=LOAD May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2796 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313839346466316632373435393961613566353137326365663761 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2796 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313839346466316632373435393961613566353137326365663761 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.246000 audit: BPF prog-id=119 op=LOAD May 13 00:41:16.246000 audit[2807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2796 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313839346466316632373435393961613566353137326365663761 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit: BPF prog-id=120 op=LOAD May 13 00:41:16.247000 audit[2807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2796 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313839346466316632373435393961613566353137326365663761 May 13 00:41:16.247000 audit: BPF prog-id=120 op=UNLOAD May 13 00:41:16.247000 audit: BPF prog-id=119 op=UNLOAD May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:16.247000 audit: BPF prog-id=121 op=LOAD May 13 00:41:16.247000 audit[2807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2796 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:16.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313839346466316632373435393961613566353137326365663761 May 13 00:41:16.247967 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:41:16.264098 env[1207]: time="2025-05-13T00:41:16.264022338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:42f024f2-f442-41d5-b159-8fcad2ead625,Namespace:default,Attempt:0,} returns sandbox id \"831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b\"" May 13 00:41:16.265507 env[1207]: time="2025-05-13T00:41:16.265462660Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 13 00:41:17.022628 kubelet[1451]: E0513 00:41:17.022574 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:18.023531 kubelet[1451]: E0513 00:41:18.023478 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:18.128314 systemd-networkd[1040]: cali60e51b789ff: Gained IPv6LL May 13 00:41:18.533477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3425219806.mount: Deactivated successfully. May 13 00:41:18.940612 update_engine[1198]: I0513 00:41:18.940088 1198 update_attempter.cc:509] Updating boot flags... May 13 00:41:19.024348 kubelet[1451]: E0513 00:41:19.024308 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:20.024623 kubelet[1451]: E0513 00:41:20.024580 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:20.285038 env[1207]: time="2025-05-13T00:41:20.284927136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:20.286491 env[1207]: time="2025-05-13T00:41:20.286460492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:20.288137 env[1207]: time="2025-05-13T00:41:20.288103168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:20.289954 env[1207]: time="2025-05-13T00:41:20.289922988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:20.291438 env[1207]: time="2025-05-13T00:41:20.291404365Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 13 00:41:20.293445 env[1207]: time="2025-05-13T00:41:20.293407131Z" level=info msg="CreateContainer within sandbox \"831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 13 00:41:20.302179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3689333213.mount: Deactivated successfully. May 13 00:41:20.304751 env[1207]: time="2025-05-13T00:41:20.304711670Z" level=info msg="CreateContainer within sandbox \"831894df1f274599aa5f5172cef7ae5085f43c253093ca8cad65e6eaa7ea0c5b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"afffdac4d8ab38c9efa321c059c36cdbb0f89e849654e51bfd111ce3a4665aef\"" May 13 00:41:20.305250 env[1207]: time="2025-05-13T00:41:20.305223616Z" level=info msg="StartContainer for \"afffdac4d8ab38c9efa321c059c36cdbb0f89e849654e51bfd111ce3a4665aef\"" May 13 00:41:20.322568 systemd[1]: Started cri-containerd-afffdac4d8ab38c9efa321c059c36cdbb0f89e849654e51bfd111ce3a4665aef.scope. May 13 00:41:20.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.361748 kernel: kauditd_printk_skb: 105 callbacks suppressed May 13 00:41:20.361822 kernel: audit: type=1400 audit(1747096880.359:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.366404 kernel: audit: type=1400 audit(1747096880.359:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.366470 kernel: audit: type=1400 audit(1747096880.359:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.371175 kernel: audit: type=1400 audit(1747096880.359:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.371220 kernel: audit: type=1400 audit(1747096880.359:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.373577 kernel: audit: type=1400 audit(1747096880.359:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.378375 kernel: audit: type=1400 audit(1747096880.359:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.378456 kernel: audit: type=1400 audit(1747096880.359:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.383222 kernel: audit: type=1400 audit(1747096880.359:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.386044 kernel: audit: type=1400 audit(1747096880.360:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.360000 audit: BPF prog-id=122 op=LOAD May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000245b38 a2=10 a3=0 items=0 ppid=2796 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166666664616334643861623338633965666133323163303539633336 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=2796 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166666664616334643861623338633965666133323163303539633336 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.365000 audit: BPF prog-id=123 op=LOAD May 13 00:41:20.365000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=2796 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166666664616334643861623338633965666133323163303539633336 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.367000 audit: BPF prog-id=124 op=LOAD May 13 00:41:20.367000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=2796 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:20.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166666664616334643861623338633965666133323163303539633336 May 13 00:41:20.370000 audit: BPF prog-id=124 op=UNLOAD May 13 00:41:20.370000 audit: BPF prog-id=123 op=UNLOAD May 13 00:41:20.370000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:20.370000 audit: BPF prog-id=125 op=LOAD May 13 00:41:20.370000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=2796 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:20.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166666664616334643861623338633965666133323163303539633336 May 13 00:41:20.397032 env[1207]: time="2025-05-13T00:41:20.396986448Z" level=info msg="StartContainer for \"afffdac4d8ab38c9efa321c059c36cdbb0f89e849654e51bfd111ce3a4665aef\" returns successfully" May 13 00:41:20.491000 audit[2886]: AVC avc: denied { search } for pid=2886 comm="rpcbind" name="crypto" dev="proc" ino=16241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:41:20.491000 audit[2886]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff874df000 a2=0 a3=0 items=0 ppid=2868 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 key=(null) May 13 00:41:20.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 13 00:41:20.529000 audit[2891]: AVC avc: denied { search } for pid=2891 comm="dbus-daemon" name="crypto" dev="proc" ino=16241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:41:20.529000 audit[2891]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff98d5f000 a2=0 a3=0 items=0 ppid=2868 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 key=(null) May 13 00:41:20.529000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:41:20.547000 audit[2892]: AVC avc: denied { watch } for pid=2892 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538168 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c364,c534 tclass=dir permissive=0 May 13 00:41:20.547000 audit[2892]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf2473870 a2=2c8 a3=aaaaf244da60 items=0 ppid=2868 pid=2892 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 key=(null) May 13 00:41:20.547000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 00:41:20.554000 audit[2893]: AVC avc: denied { read } for pid=2893 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=16315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 13 00:41:20.554000 audit[2893]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffaf14a570 a2=80000 a3=0 items=0 ppid=2868 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 key=(null) May 13 00:41:20.554000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:41:20.555000 audit[2893]: AVC avc: denied { search } for pid=2893 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 00:41:20.555000 audit[2893]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae4df000 a2=0 a3=0 items=0 ppid=2868 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c534 key=(null) May 13 00:41:20.555000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 00:41:21.025540 kubelet[1451]: E0513 00:41:21.025424 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:21.263924 kubelet[1451]: I0513 00:41:21.263857 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.237018266 podStartE2EDuration="6.263841116s" podCreationTimestamp="2025-05-13 00:41:15 +0000 UTC" firstStartedPulling="2025-05-13 00:41:16.265155203 +0000 UTC m=+35.354810579" lastFinishedPulling="2025-05-13 00:41:20.291978053 +0000 UTC m=+39.381633429" observedRunningTime="2025-05-13 00:41:21.26315612 +0000 UTC m=+40.352811536" watchObservedRunningTime="2025-05-13 00:41:21.263841116 +0000 UTC m=+40.353496492" May 13 00:41:21.273000 audit[2913]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.273000 audit[2913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffff44c490 a2=0 a3=1 items=0 ppid=1607 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:21.284000 audit[2913]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:21.284000 audit[2913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffff44c490 a2=0 a3=1 items=0 ppid=1607 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:21.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:22.001128 kubelet[1451]: E0513 00:41:22.001096 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:22.025632 kubelet[1451]: E0513 00:41:22.025580 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:23.026259 kubelet[1451]: E0513 00:41:23.026212 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:24.026721 kubelet[1451]: E0513 00:41:24.026679 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:25.027258 kubelet[1451]: E0513 00:41:25.027223 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:26.027737 kubelet[1451]: E0513 00:41:26.027672 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:27.028142 kubelet[1451]: E0513 00:41:27.028107 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:27.261000 audit[2922]: NETFILTER_CFG table=filter:86 family=2 entries=8 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.264743 kernel: kauditd_printk_skb: 68 callbacks suppressed May 13 00:41:27.264850 kernel: audit: type=1325 audit(1747096887.261:760): table=filter:86 family=2 entries=8 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.264877 kernel: audit: type=1300 audit(1747096887.261:760): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff001dff0 a2=0 a3=1 items=0 ppid=1607 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.261000 audit[2922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff001dff0 a2=0 a3=1 items=0 ppid=1607 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:27.270110 kernel: audit: type=1327 audit(1747096887.261:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:27.276000 audit[2922]: NETFILTER_CFG table=nat:87 family=2 entries=58 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.276000 audit[2922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffff001dff0 a2=0 a3=1 items=0 ppid=1607 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.283903 kernel: audit: type=1325 audit(1747096887.276:761): table=nat:87 family=2 entries=58 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:41:27.283978 kernel: audit: type=1300 audit(1747096887.276:761): arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffff001dff0 a2=0 a3=1 items=0 ppid=1607 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:27.284006 kernel: audit: type=1327 audit(1747096887.276:761): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:27.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:41:28.028584 kubelet[1451]: E0513 00:41:28.028542 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:29.029651 kubelet[1451]: E0513 00:41:29.029608 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:30.030524 kubelet[1451]: E0513 00:41:30.030484 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:30.223357 systemd[1]: Created slice kubepods-besteffort-pod5c79d215_ed75_4965_8a28_8b8e04a1a4f4.slice. May 13 00:41:30.407414 kubelet[1451]: I0513 00:41:30.407046 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-6bc9cb33-ae66-4a6d-9fcf-81fadf57002e\" (UniqueName: \"kubernetes.io/nfs/5c79d215-ed75-4965-8a28-8b8e04a1a4f4-pvc-6bc9cb33-ae66-4a6d-9fcf-81fadf57002e\") pod \"test-pod-1\" (UID: \"5c79d215-ed75-4965-8a28-8b8e04a1a4f4\") " pod="default/test-pod-1" May 13 00:41:30.407708 kubelet[1451]: I0513 00:41:30.407685 1451 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hc4tm\" (UniqueName: \"kubernetes.io/projected/5c79d215-ed75-4965-8a28-8b8e04a1a4f4-kube-api-access-hc4tm\") pod \"test-pod-1\" (UID: \"5c79d215-ed75-4965-8a28-8b8e04a1a4f4\") " pod="default/test-pod-1" May 13 00:41:30.520000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.526059 kernel: Failed to create system directory netfs May 13 00:41:30.526109 kernel: audit: type=1400 audit(1747096890.520:762): avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.526134 kernel: Failed to create system directory netfs May 13 00:41:30.526151 kernel: audit: type=1400 audit(1747096890.520:762): avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.520000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.529139 kernel: Failed to create system directory netfs May 13 00:41:30.529179 kernel: audit: type=1400 audit(1747096890.520:762): avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.520000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.532247 kernel: Failed to create system directory netfs May 13 00:41:30.532281 kernel: audit: type=1400 audit(1747096890.520:762): avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.520000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.520000 audit[2926]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabe7345e0 a1=12c14 a2=aaaabe4ce028 a3=aaaabe725010 items=0 ppid=2768 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.520000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.540597 kernel: Failed to create system directory fscache May 13 00:41:30.540636 kernel: Failed to create system directory fscache May 13 00:41:30.540657 kernel: Failed to create system directory fscache May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.542323 kernel: Failed to create system directory fscache May 13 00:41:30.542365 kernel: Failed to create system directory fscache May 13 00:41:30.542384 kernel: Failed to create system directory fscache May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.543475 kernel: Failed to create system directory fscache May 13 00:41:30.543510 kernel: Failed to create system directory fscache May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.544657 kernel: Failed to create system directory fscache May 13 00:41:30.544683 kernel: Failed to create system directory fscache May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.546381 kernel: Failed to create system directory fscache May 13 00:41:30.546406 kernel: Failed to create system directory fscache May 13 00:41:30.546422 kernel: Failed to create system directory fscache May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.535000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.547516 kernel: Failed to create system directory fscache May 13 00:41:30.548090 kernel: FS-Cache: Loaded May 13 00:41:30.535000 audit[2926]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabe947210 a1=4c344 a2=aaaabe4ce028 a3=aaaabe725010 items=0 ppid=2768 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.535000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.570428 kernel: Failed to create system directory sunrpc May 13 00:41:30.570465 kernel: Failed to create system directory sunrpc May 13 00:41:30.570480 kernel: Failed to create system directory sunrpc May 13 00:41:30.570508 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.571550 kernel: Failed to create system directory sunrpc May 13 00:41:30.571574 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.573218 kernel: Failed to create system directory sunrpc May 13 00:41:30.573249 kernel: Failed to create system directory sunrpc May 13 00:41:30.573263 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.574317 kernel: Failed to create system directory sunrpc May 13 00:41:30.574344 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.575429 kernel: Failed to create system directory sunrpc May 13 00:41:30.575453 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.576532 kernel: Failed to create system directory sunrpc May 13 00:41:30.576553 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.578185 kernel: Failed to create system directory sunrpc May 13 00:41:30.578207 kernel: Failed to create system directory sunrpc May 13 00:41:30.578230 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.579302 kernel: Failed to create system directory sunrpc May 13 00:41:30.579323 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.580405 kernel: Failed to create system directory sunrpc May 13 00:41:30.580430 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.581513 kernel: Failed to create system directory sunrpc May 13 00:41:30.581533 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.583163 kernel: Failed to create system directory sunrpc May 13 00:41:30.583184 kernel: Failed to create system directory sunrpc May 13 00:41:30.583198 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.584266 kernel: Failed to create system directory sunrpc May 13 00:41:30.584295 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.585402 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.586608 kernel: Failed to create system directory sunrpc May 13 00:41:30.586635 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.587250 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.588414 kernel: Failed to create system directory sunrpc May 13 00:41:30.588435 kernel: Failed to create system directory sunrpc May 13 00:41:30.588455 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.589530 kernel: Failed to create system directory sunrpc May 13 00:41:30.589557 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.591180 kernel: Failed to create system directory sunrpc May 13 00:41:30.591200 kernel: Failed to create system directory sunrpc May 13 00:41:30.591214 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.592295 kernel: Failed to create system directory sunrpc May 13 00:41:30.592323 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.593409 kernel: Failed to create system directory sunrpc May 13 00:41:30.593435 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.594516 kernel: Failed to create system directory sunrpc May 13 00:41:30.594540 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.596224 kernel: Failed to create system directory sunrpc May 13 00:41:30.596256 kernel: Failed to create system directory sunrpc May 13 00:41:30.596273 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.597371 kernel: Failed to create system directory sunrpc May 13 00:41:30.597397 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.598535 kernel: Failed to create system directory sunrpc May 13 00:41:30.598559 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.600243 kernel: Failed to create system directory sunrpc May 13 00:41:30.600268 kernel: Failed to create system directory sunrpc May 13 00:41:30.600286 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.601380 kernel: Failed to create system directory sunrpc May 13 00:41:30.601406 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.602528 kernel: Failed to create system directory sunrpc May 13 00:41:30.602549 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.604237 kernel: Failed to create system directory sunrpc May 13 00:41:30.604269 kernel: Failed to create system directory sunrpc May 13 00:41:30.604288 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.605376 kernel: Failed to create system directory sunrpc May 13 00:41:30.605402 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.606541 kernel: Failed to create system directory sunrpc May 13 00:41:30.606566 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.608248 kernel: Failed to create system directory sunrpc May 13 00:41:30.608269 kernel: Failed to create system directory sunrpc May 13 00:41:30.608283 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.609389 kernel: Failed to create system directory sunrpc May 13 00:41:30.609510 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.610552 kernel: Failed to create system directory sunrpc May 13 00:41:30.610576 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.612280 kernel: Failed to create system directory sunrpc May 13 00:41:30.612300 kernel: Failed to create system directory sunrpc May 13 00:41:30.612313 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.613424 kernel: Failed to create system directory sunrpc May 13 00:41:30.613449 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.614570 kernel: Failed to create system directory sunrpc May 13 00:41:30.614592 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.616288 kernel: Failed to create system directory sunrpc May 13 00:41:30.616316 kernel: Failed to create system directory sunrpc May 13 00:41:30.616340 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.617428 kernel: Failed to create system directory sunrpc May 13 00:41:30.617455 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.618589 kernel: Failed to create system directory sunrpc May 13 00:41:30.618608 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.620303 kernel: Failed to create system directory sunrpc May 13 00:41:30.620328 kernel: Failed to create system directory sunrpc May 13 00:41:30.620347 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.621446 kernel: Failed to create system directory sunrpc May 13 00:41:30.621465 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.622601 kernel: Failed to create system directory sunrpc May 13 00:41:30.622623 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.624309 kernel: Failed to create system directory sunrpc May 13 00:41:30.624337 kernel: Failed to create system directory sunrpc May 13 00:41:30.624354 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.625453 kernel: Failed to create system directory sunrpc May 13 00:41:30.625479 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.626651 kernel: Failed to create system directory sunrpc May 13 00:41:30.626677 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.628385 kernel: Failed to create system directory sunrpc May 13 00:41:30.628403 kernel: Failed to create system directory sunrpc May 13 00:41:30.628416 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.629533 kernel: Failed to create system directory sunrpc May 13 00:41:30.629557 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.631226 kernel: Failed to create system directory sunrpc May 13 00:41:30.631253 kernel: Failed to create system directory sunrpc May 13 00:41:30.631268 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.632370 kernel: Failed to create system directory sunrpc May 13 00:41:30.632396 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.633511 kernel: Failed to create system directory sunrpc May 13 00:41:30.633529 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.635220 kernel: Failed to create system directory sunrpc May 13 00:41:30.635240 kernel: Failed to create system directory sunrpc May 13 00:41:30.635261 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.636383 kernel: Failed to create system directory sunrpc May 13 00:41:30.636409 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.637544 kernel: Failed to create system directory sunrpc May 13 00:41:30.637570 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.639251 kernel: Failed to create system directory sunrpc May 13 00:41:30.639270 kernel: Failed to create system directory sunrpc May 13 00:41:30.639283 kernel: Failed to create system directory sunrpc May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.562000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.640388 kernel: Failed to create system directory sunrpc May 13 00:41:30.648498 kernel: RPC: Registered named UNIX socket transport module. May 13 00:41:30.648542 kernel: RPC: Registered udp transport module. May 13 00:41:30.648557 kernel: RPC: Registered tcp transport module. May 13 00:41:30.648570 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 13 00:41:30.562000 audit[2926]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabe993560 a1=14a72c a2=aaaabe4ce028 a3=aaaabe725010 items=6 ppid=2768 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.562000 audit: CWD cwd="/" May 13 00:41:30.562000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PATH item=1 name=(null) inode=18553 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PATH item=2 name=(null) inode=18553 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PATH item=3 name=(null) inode=18554 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PATH item=4 name=(null) inode=18553 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PATH item=5 name=(null) inode=18555 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:41:30.562000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.677539 kernel: Failed to create system directory nfs May 13 00:41:30.677573 kernel: Failed to create system directory nfs May 13 00:41:30.677587 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.679169 kernel: Failed to create system directory nfs May 13 00:41:30.679207 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.680756 kernel: Failed to create system directory nfs May 13 00:41:30.680781 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.682397 kernel: Failed to create system directory nfs May 13 00:41:30.682431 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.684731 kernel: Failed to create system directory nfs May 13 00:41:30.684755 kernel: Failed to create system directory nfs May 13 00:41:30.684769 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.686300 kernel: Failed to create system directory nfs May 13 00:41:30.686321 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.687538 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.688235 kernel: Failed to create system directory nfs May 13 00:41:30.688263 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.689323 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.690435 kernel: Failed to create system directory nfs May 13 00:41:30.690456 kernel: Failed to create system directory nfs May 13 00:41:30.690471 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.691583 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.692135 kernel: Failed to create system directory nfs May 13 00:41:30.692155 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.693275 kernel: Failed to create system directory nfs May 13 00:41:30.693305 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.694397 kernel: Failed to create system directory nfs May 13 00:41:30.694417 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.695570 kernel: Failed to create system directory nfs May 13 00:41:30.695601 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.697238 kernel: Failed to create system directory nfs May 13 00:41:30.697260 kernel: Failed to create system directory nfs May 13 00:41:30.697279 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.698324 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.699411 kernel: Failed to create system directory nfs May 13 00:41:30.699427 kernel: Failed to create system directory nfs May 13 00:41:30.699445 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.700520 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.701085 kernel: Failed to create system directory nfs May 13 00:41:30.701101 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.702160 kernel: Failed to create system directory nfs May 13 00:41:30.702184 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.703236 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.704327 kernel: Failed to create system directory nfs May 13 00:41:30.704347 kernel: Failed to create system directory nfs May 13 00:41:30.704368 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.705449 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.706584 kernel: Failed to create system directory nfs May 13 00:41:30.706606 kernel: Failed to create system directory nfs May 13 00:41:30.706621 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.708218 kernel: Failed to create system directory nfs May 13 00:41:30.708245 kernel: Failed to create system directory nfs May 13 00:41:30.708260 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.709300 kernel: Failed to create system directory nfs May 13 00:41:30.709325 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.710385 kernel: Failed to create system directory nfs May 13 00:41:30.710405 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.711483 kernel: Failed to create system directory nfs May 13 00:41:30.711504 kernel: Failed to create system directory nfs May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.670000 audit[2926]: AVC avc: denied { confidentiality } for pid=2926 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.712571 kernel: Failed to create system directory nfs May 13 00:41:30.727087 kernel: FS-Cache: Netfs 'nfs' registered for caching May 13 00:41:30.670000 audit[2926]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabeb3c9f0 a1=1162dc a2=aaaabe4ce028 a3=aaaabe725010 items=0 ppid=2768 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.670000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.756615 kernel: Failed to create system directory nfs4 May 13 00:41:30.756668 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.757357 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.758142 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.759457 kernel: Failed to create system directory nfs4 May 13 00:41:30.759518 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.760206 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.761579 kernel: Failed to create system directory nfs4 May 13 00:41:30.761635 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.762313 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.763107 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.764415 kernel: Failed to create system directory nfs4 May 13 00:41:30.764471 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.765158 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.766566 kernel: Failed to create system directory nfs4 May 13 00:41:30.766624 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.767324 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.768113 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.769502 kernel: Failed to create system directory nfs4 May 13 00:41:30.769548 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.770245 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.771657 kernel: Failed to create system directory nfs4 May 13 00:41:30.771703 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.772396 kernel: Failed to create system directory nfs4 May 13 00:41:30.772450 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.773563 kernel: Failed to create system directory nfs4 May 13 00:41:30.773602 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.775268 kernel: Failed to create system directory nfs4 May 13 00:41:30.775296 kernel: Failed to create system directory nfs4 May 13 00:41:30.775310 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.776406 kernel: Failed to create system directory nfs4 May 13 00:41:30.776436 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.777528 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.778115 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.779248 kernel: Failed to create system directory nfs4 May 13 00:41:30.779271 kernel: Failed to create system directory nfs4 May 13 00:41:30.779284 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.780387 kernel: Failed to create system directory nfs4 May 13 00:41:30.780420 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.781525 kernel: Failed to create system directory nfs4 May 13 00:41:30.781558 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.783228 kernel: Failed to create system directory nfs4 May 13 00:41:30.783257 kernel: Failed to create system directory nfs4 May 13 00:41:30.783271 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.784360 kernel: Failed to create system directory nfs4 May 13 00:41:30.784394 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.785483 kernel: Failed to create system directory nfs4 May 13 00:41:30.785512 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.787187 kernel: Failed to create system directory nfs4 May 13 00:41:30.787212 kernel: Failed to create system directory nfs4 May 13 00:41:30.787227 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.788315 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.789446 kernel: Failed to create system directory nfs4 May 13 00:41:30.789471 kernel: Failed to create system directory nfs4 May 13 00:41:30.789485 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.790579 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.791144 kernel: Failed to create system directory nfs4 May 13 00:41:30.791179 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.792271 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.793398 kernel: Failed to create system directory nfs4 May 13 00:41:30.793422 kernel: Failed to create system directory nfs4 May 13 00:41:30.793435 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.794517 kernel: Failed to create system directory nfs4 May 13 00:41:30.794556 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.796208 kernel: Failed to create system directory nfs4 May 13 00:41:30.796242 kernel: Failed to create system directory nfs4 May 13 00:41:30.796257 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.797347 kernel: Failed to create system directory nfs4 May 13 00:41:30.797379 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.798470 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.799639 kernel: Failed to create system directory nfs4 May 13 00:41:30.799662 kernel: Failed to create system directory nfs4 May 13 00:41:30.799676 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.801309 kernel: Failed to create system directory nfs4 May 13 00:41:30.801343 kernel: Failed to create system directory nfs4 May 13 00:41:30.801359 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.802424 kernel: Failed to create system directory nfs4 May 13 00:41:30.802460 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.803570 kernel: Failed to create system directory nfs4 May 13 00:41:30.803597 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.805255 kernel: Failed to create system directory nfs4 May 13 00:41:30.805279 kernel: Failed to create system directory nfs4 May 13 00:41:30.805293 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.806403 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.807540 kernel: Failed to create system directory nfs4 May 13 00:41:30.807563 kernel: Failed to create system directory nfs4 May 13 00:41:30.807588 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.809231 kernel: Failed to create system directory nfs4 May 13 00:41:30.809263 kernel: Failed to create system directory nfs4 May 13 00:41:30.809278 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.810347 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.811492 kernel: Failed to create system directory nfs4 May 13 00:41:30.811520 kernel: Failed to create system directory nfs4 May 13 00:41:30.811537 kernel: Failed to create system directory nfs4 May 13 00:41:30.747000 audit[2931]: AVC avc: denied { confidentiality } for pid=2931 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.916100 kernel: NFS: Registering the id_resolver key type May 13 00:41:30.916179 kernel: Key type id_resolver registered May 13 00:41:30.916215 kernel: Key type id_legacy registered May 13 00:41:30.747000 audit[2931]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa521a010 a1=19c694 a2=aaaac0b5e028 a3=aaaaeed9b010 items=0 ppid=2768 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.747000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.926407 kernel: Failed to create system directory rpcgss May 13 00:41:30.926450 kernel: Failed to create system directory rpcgss May 13 00:41:30.926466 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.927864 kernel: Failed to create system directory rpcgss May 13 00:41:30.927939 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.929657 kernel: Failed to create system directory rpcgss May 13 00:41:30.929699 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.931461 kernel: Failed to create system directory rpcgss May 13 00:41:30.931500 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.933299 kernel: Failed to create system directory rpcgss May 13 00:41:30.933333 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.935866 kernel: Failed to create system directory rpcgss May 13 00:41:30.935902 kernel: Failed to create system directory rpcgss May 13 00:41:30.935918 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.937493 kernel: Failed to create system directory rpcgss May 13 00:41:30.937540 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.938652 kernel: Failed to create system directory rpcgss May 13 00:41:30.938698 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.940399 kernel: Failed to create system directory rpcgss May 13 00:41:30.940442 kernel: Failed to create system directory rpcgss May 13 00:41:30.940459 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.941614 kernel: Failed to create system directory rpcgss May 13 00:41:30.941653 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.943348 kernel: Failed to create system directory rpcgss May 13 00:41:30.943383 kernel: Failed to create system directory rpcgss May 13 00:41:30.943415 kernel: Failed to create system directory rpcgss May 13 00:41:30.922000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:41:30.922000 audit[2932]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff828e2010 a1=5ee7c a2=aaaac535e028 a3=aaaaf8f3d010 items=0 ppid=2768 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.922000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 13 00:41:30.963425 nfsidmap[2941]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:41:30.970219 nfsidmap[2944]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:41:30.978000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit[1276]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaafe50e350 a2=10 a3=0 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.978000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:41:30.978000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit[1276]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaafe50e350 a2=10 a3=0 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.978000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:41:30.978000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:41:30.978000 audit[1276]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaafe50e350 a2=10 a3=0 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:30.978000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:41:31.030993 kubelet[1451]: E0513 00:41:31.030958 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:31.126010 env[1207]: time="2025-05-13T00:41:31.125959596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5c79d215-ed75-4965-8a28-8b8e04a1a4f4,Namespace:default,Attempt:0,}" May 13 00:41:31.235667 systemd-networkd[1040]: cali5ec59c6bf6e: Link UP May 13 00:41:31.238321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:41:31.238541 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 13 00:41:31.238453 systemd-networkd[1040]: cali5ec59c6bf6e: Gained carrier May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.170 [INFO][2947] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.138-k8s-test--pod--1-eth0 default 5c79d215-ed75-4965-8a28-8b8e04a1a4f4 1150 0 2025-05-13 00:41:16 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.138 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.170 [INFO][2947] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.193 [INFO][2961] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" HandleID="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Workload="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.207 [INFO][2961] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" HandleID="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Workload="10.0.0.138-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000297f00), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.138", "pod":"test-pod-1", "timestamp":"2025-05-13 00:41:31.193601534 +0000 UTC"}, Hostname:"10.0.0.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.207 [INFO][2961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.207 [INFO][2961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.207 [INFO][2961] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.138' May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.209 [INFO][2961] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.213 [INFO][2961] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.217 [INFO][2961] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.219 [INFO][2961] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.221 [INFO][2961] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.221 [INFO][2961] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.222 [INFO][2961] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.226 [INFO][2961] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.231 [INFO][2961] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.68/26] block=192.168.97.64/26 handle="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.231 [INFO][2961] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.68/26] handle="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" host="10.0.0.138" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.231 [INFO][2961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.231 [INFO][2961] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.68/26] IPv6=[] ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" HandleID="k8s-pod-network.1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Workload="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250360 env[1207]: 2025-05-13 00:41:31.233 [INFO][2947] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5c79d215-ed75-4965-8a28-8b8e04a1a4f4", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 41, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:31.250918 env[1207]: 2025-05-13 00:41:31.233 [INFO][2947] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.68/32] ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250918 env[1207]: 2025-05-13 00:41:31.233 [INFO][2947] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250918 env[1207]: 2025-05-13 00:41:31.238 [INFO][2947] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.250918 env[1207]: 2025-05-13 00:41:31.242 [INFO][2947] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.138-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5c79d215-ed75-4965-8a28-8b8e04a1a4f4", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 41, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.138", ContainerID:"1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ea:5e:57:0c:72:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:41:31.250918 env[1207]: 2025-05-13 00:41:31.248 [INFO][2947] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.138-k8s-test--pod--1-eth0" May 13 00:41:31.258000 audit[2983]: NETFILTER_CFG table=filter:88 family=2 entries=34 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:41:31.258000 audit[2983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18196 a0=3 a1=fffffeb78270 a2=0 a3=ffff99dedfa8 items=0 ppid=2131 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:41:31.263394 env[1207]: time="2025-05-13T00:41:31.263319608Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:41:31.263394 env[1207]: time="2025-05-13T00:41:31.263364178Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:41:31.263514 env[1207]: time="2025-05-13T00:41:31.263374940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:41:31.263514 env[1207]: time="2025-05-13T00:41:31.263496687Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a pid=2992 runtime=io.containerd.runc.v2 May 13 00:41:31.274099 systemd[1]: Started cri-containerd-1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a.scope. May 13 00:41:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.314000 audit: BPF prog-id=126 op=LOAD May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2992 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373233303238623266363431313136376539316130663463313339 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2992 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373233303238623266363431313136376539316130663463313339 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit: BPF prog-id=127 op=LOAD May 13 00:41:31.315000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2992 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373233303238623266363431313136376539316130663463313339 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit: BPF prog-id=128 op=LOAD May 13 00:41:31.315000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2992 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373233303238623266363431313136376539316130663463313339 May 13 00:41:31.315000 audit: BPF prog-id=128 op=UNLOAD May 13 00:41:31.315000 audit: BPF prog-id=127 op=UNLOAD May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.315000 audit: BPF prog-id=129 op=LOAD May 13 00:41:31.315000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2992 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373233303238623266363431313136376539316130663463313339 May 13 00:41:31.317095 systemd-resolved[1150]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:41:31.332058 env[1207]: time="2025-05-13T00:41:31.332016738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5c79d215-ed75-4965-8a28-8b8e04a1a4f4,Namespace:default,Attempt:0,} returns sandbox id \"1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a\"" May 13 00:41:31.333395 env[1207]: time="2025-05-13T00:41:31.333371556Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:41:31.580477 env[1207]: time="2025-05-13T00:41:31.580433105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:31.581719 env[1207]: time="2025-05-13T00:41:31.581690581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:31.583249 env[1207]: time="2025-05-13T00:41:31.583222238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:31.584867 env[1207]: time="2025-05-13T00:41:31.584839633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:41:31.586503 env[1207]: time="2025-05-13T00:41:31.586469311Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 13 00:41:31.588343 env[1207]: time="2025-05-13T00:41:31.588311556Z" level=info msg="CreateContainer within sandbox \"1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 13 00:41:31.598505 env[1207]: time="2025-05-13T00:41:31.598463826Z" level=info msg="CreateContainer within sandbox \"1a723028b2f6411167e91a0f4c139a910976247bc175c0d35cc400ce64a8da6a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"543192e60de3a801f622dba50a35c56ad542415f13eb08da9773dd4f19f934f7\"" May 13 00:41:31.598946 env[1207]: time="2025-05-13T00:41:31.598922526Z" level=info msg="StartContainer for \"543192e60de3a801f622dba50a35c56ad542415f13eb08da9773dd4f19f934f7\"" May 13 00:41:31.614632 systemd[1]: Started cri-containerd-543192e60de3a801f622dba50a35c56ad542415f13eb08da9773dd4f19f934f7.scope. May 13 00:41:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.641000 audit: BPF prog-id=130 op=LOAD May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2992 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534333139326536306465336138303166363232646261353061333563 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2992 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534333139326536306465336138303166363232646261353061333563 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit: BPF prog-id=131 op=LOAD May 13 00:41:31.642000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2992 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534333139326536306465336138303166363232646261353061333563 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit: BPF prog-id=132 op=LOAD May 13 00:41:31.642000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2992 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534333139326536306465336138303166363232646261353061333563 May 13 00:41:31.642000 audit: BPF prog-id=132 op=UNLOAD May 13 00:41:31.642000 audit: BPF prog-id=131 op=UNLOAD May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:41:31.642000 audit: BPF prog-id=133 op=LOAD May 13 00:41:31.642000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2992 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:41:31.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534333139326536306465336138303166363232646261353061333563 May 13 00:41:31.654092 env[1207]: time="2025-05-13T00:41:31.654039393Z" level=info msg="StartContainer for \"543192e60de3a801f622dba50a35c56ad542415f13eb08da9773dd4f19f934f7\" returns successfully" May 13 00:41:32.032035 kubelet[1451]: E0513 00:41:32.032002 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:32.283086 kubelet[1451]: I0513 00:41:32.282944 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.028739745 podStartE2EDuration="16.282922698s" podCreationTimestamp="2025-05-13 00:41:16 +0000 UTC" firstStartedPulling="2025-05-13 00:41:31.33293474 +0000 UTC m=+50.422590156" lastFinishedPulling="2025-05-13 00:41:31.587117733 +0000 UTC m=+50.676773109" observedRunningTime="2025-05-13 00:41:32.282574584 +0000 UTC m=+51.372230000" watchObservedRunningTime="2025-05-13 00:41:32.282922698 +0000 UTC m=+51.372578114" May 13 00:41:32.520449 systemd[1]: run-containerd-runc-k8s.io-543192e60de3a801f622dba50a35c56ad542415f13eb08da9773dd4f19f934f7-runc.cWYLMj.mount: Deactivated successfully. May 13 00:41:32.529226 systemd-networkd[1040]: cali5ec59c6bf6e: Gained IPv6LL May 13 00:41:33.032207 kubelet[1451]: E0513 00:41:33.032140 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:34.033305 kubelet[1451]: E0513 00:41:34.033246 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:35.034116 kubelet[1451]: E0513 00:41:35.034063 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:36.034807 kubelet[1451]: E0513 00:41:36.034757 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:37.035344 kubelet[1451]: E0513 00:41:37.035304 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:41:38.036221 kubelet[1451]: E0513 00:41:38.036183 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"