May 14 00:47:43.718809 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 14 00:47:43.718830 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue May 13 23:17:31 -00 2025 May 14 00:47:43.718838 kernel: efi: EFI v2.70 by EDK II May 14 00:47:43.718844 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 14 00:47:43.718849 kernel: random: crng init done May 14 00:47:43.718854 kernel: ACPI: Early table checksum verification disabled May 14 00:47:43.718860 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 14 00:47:43.718867 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 14 00:47:43.718873 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718878 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718884 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718889 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718894 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718900 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718908 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718914 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718925 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:47:43.718931 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 14 00:47:43.718937 kernel: NUMA: Failed to initialise from firmware May 14 00:47:43.718943 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:47:43.718950 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] May 14 00:47:43.718956 kernel: Zone ranges: May 14 00:47:43.718962 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:47:43.718969 kernel: DMA32 empty May 14 00:47:43.718975 kernel: Normal empty May 14 00:47:43.718980 kernel: Movable zone start for each node May 14 00:47:43.718986 kernel: Early memory node ranges May 14 00:47:43.718991 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 14 00:47:43.718997 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 14 00:47:43.719003 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 14 00:47:43.719008 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 14 00:47:43.719014 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 14 00:47:43.719020 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 14 00:47:43.719025 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 14 00:47:43.719031 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:47:43.719038 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 14 00:47:43.719043 kernel: psci: probing for conduit method from ACPI. May 14 00:47:43.719049 kernel: psci: PSCIv1.1 detected in firmware. May 14 00:47:43.719054 kernel: psci: Using standard PSCI v0.2 function IDs May 14 00:47:43.719060 kernel: psci: Trusted OS migration not required May 14 00:47:43.719068 kernel: psci: SMC Calling Convention v1.1 May 14 00:47:43.719074 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 14 00:47:43.719081 kernel: ACPI: SRAT not present May 14 00:47:43.719088 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 14 00:47:43.719094 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 14 00:47:43.719100 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 14 00:47:43.719106 kernel: Detected PIPT I-cache on CPU0 May 14 00:47:43.719113 kernel: CPU features: detected: GIC system register CPU interface May 14 00:47:43.719119 kernel: CPU features: detected: Hardware dirty bit management May 14 00:47:43.719125 kernel: CPU features: detected: Spectre-v4 May 14 00:47:43.719131 kernel: CPU features: detected: Spectre-BHB May 14 00:47:43.719138 kernel: CPU features: kernel page table isolation forced ON by KASLR May 14 00:47:43.719144 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 14 00:47:43.719150 kernel: CPU features: detected: ARM erratum 1418040 May 14 00:47:43.719163 kernel: CPU features: detected: SSBS not fully self-synchronizing May 14 00:47:43.719202 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 14 00:47:43.719208 kernel: Policy zone: DMA May 14 00:47:43.719215 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:47:43.719222 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 14 00:47:43.719228 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 14 00:47:43.719234 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 14 00:47:43.719240 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 14 00:47:43.719248 kernel: Memory: 2457332K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114956K reserved, 0K cma-reserved) May 14 00:47:43.719255 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 14 00:47:43.719261 kernel: trace event string verifier disabled May 14 00:47:43.719266 kernel: rcu: Preemptible hierarchical RCU implementation. May 14 00:47:43.719273 kernel: rcu: RCU event tracing is enabled. May 14 00:47:43.719279 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 14 00:47:43.719285 kernel: Trampoline variant of Tasks RCU enabled. May 14 00:47:43.719292 kernel: Tracing variant of Tasks RCU enabled. May 14 00:47:43.719298 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 14 00:47:43.719304 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 14 00:47:43.719310 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 14 00:47:43.719317 kernel: GICv3: 256 SPIs implemented May 14 00:47:43.719323 kernel: GICv3: 0 Extended SPIs implemented May 14 00:47:43.719329 kernel: GICv3: Distributor has no Range Selector support May 14 00:47:43.719335 kernel: Root IRQ handler: gic_handle_irq May 14 00:47:43.719341 kernel: GICv3: 16 PPIs implemented May 14 00:47:43.719347 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 14 00:47:43.719353 kernel: ACPI: SRAT not present May 14 00:47:43.719359 kernel: ITS [mem 0x08080000-0x0809ffff] May 14 00:47:43.719365 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 14 00:47:43.719371 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 14 00:47:43.719377 kernel: GICv3: using LPI property table @0x00000000400d0000 May 14 00:47:43.719383 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 14 00:47:43.719391 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:47:43.719397 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 14 00:47:43.719403 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 14 00:47:43.719409 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 14 00:47:43.719415 kernel: arm-pv: using stolen time PV May 14 00:47:43.719422 kernel: Console: colour dummy device 80x25 May 14 00:47:43.719428 kernel: ACPI: Core revision 20210730 May 14 00:47:43.719435 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 14 00:47:43.719441 kernel: pid_max: default: 32768 minimum: 301 May 14 00:47:43.719447 kernel: LSM: Security Framework initializing May 14 00:47:43.719455 kernel: SELinux: Initializing. May 14 00:47:43.719461 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:47:43.719467 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:47:43.719473 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 14 00:47:43.719479 kernel: rcu: Hierarchical SRCU implementation. May 14 00:47:43.719485 kernel: Platform MSI: ITS@0x8080000 domain created May 14 00:47:43.719492 kernel: PCI/MSI: ITS@0x8080000 domain created May 14 00:47:43.719498 kernel: Remapping and enabling EFI services. May 14 00:47:43.719504 kernel: smp: Bringing up secondary CPUs ... May 14 00:47:43.719512 kernel: Detected PIPT I-cache on CPU1 May 14 00:47:43.719518 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 14 00:47:43.719524 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 14 00:47:43.719530 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:47:43.719536 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 14 00:47:43.719543 kernel: Detected PIPT I-cache on CPU2 May 14 00:47:43.719549 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 14 00:47:43.719555 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 14 00:47:43.719562 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:47:43.719568 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 14 00:47:43.719576 kernel: Detected PIPT I-cache on CPU3 May 14 00:47:43.719582 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 14 00:47:43.719588 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 14 00:47:43.719594 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:47:43.719612 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 14 00:47:43.719620 kernel: smp: Brought up 1 node, 4 CPUs May 14 00:47:43.719626 kernel: SMP: Total of 4 processors activated. May 14 00:47:43.719633 kernel: CPU features: detected: 32-bit EL0 Support May 14 00:47:43.719640 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 14 00:47:43.719646 kernel: CPU features: detected: Common not Private translations May 14 00:47:43.719652 kernel: CPU features: detected: CRC32 instructions May 14 00:47:43.719659 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 14 00:47:43.719667 kernel: CPU features: detected: LSE atomic instructions May 14 00:47:43.719674 kernel: CPU features: detected: Privileged Access Never May 14 00:47:43.719680 kernel: CPU features: detected: RAS Extension Support May 14 00:47:43.719687 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 14 00:47:43.719693 kernel: CPU: All CPU(s) started at EL1 May 14 00:47:43.719701 kernel: alternatives: patching kernel code May 14 00:47:43.719707 kernel: devtmpfs: initialized May 14 00:47:43.719714 kernel: KASLR enabled May 14 00:47:43.719720 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 14 00:47:43.719727 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 14 00:47:43.719733 kernel: pinctrl core: initialized pinctrl subsystem May 14 00:47:43.719740 kernel: SMBIOS 3.0.0 present. May 14 00:47:43.719746 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 14 00:47:43.719753 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 14 00:47:43.719761 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 14 00:47:43.719767 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 14 00:47:43.719774 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 14 00:47:43.719781 kernel: audit: initializing netlink subsys (disabled) May 14 00:47:43.719787 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 May 14 00:47:43.719794 kernel: thermal_sys: Registered thermal governor 'step_wise' May 14 00:47:43.719800 kernel: cpuidle: using governor menu May 14 00:47:43.719807 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 14 00:47:43.719814 kernel: ASID allocator initialised with 32768 entries May 14 00:47:43.719821 kernel: ACPI: bus type PCI registered May 14 00:47:43.719828 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 14 00:47:43.719835 kernel: Serial: AMBA PL011 UART driver May 14 00:47:43.719841 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 14 00:47:43.719848 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 14 00:47:43.719854 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 14 00:47:43.719861 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 14 00:47:43.719867 kernel: cryptd: max_cpu_qlen set to 1000 May 14 00:47:43.719874 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 14 00:47:43.719882 kernel: ACPI: Added _OSI(Module Device) May 14 00:47:43.719888 kernel: ACPI: Added _OSI(Processor Device) May 14 00:47:43.719895 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 14 00:47:43.719901 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 14 00:47:43.719908 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 14 00:47:43.719914 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 14 00:47:43.719921 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 14 00:47:43.719927 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 14 00:47:43.719934 kernel: ACPI: Interpreter enabled May 14 00:47:43.719942 kernel: ACPI: Using GIC for interrupt routing May 14 00:47:43.719948 kernel: ACPI: MCFG table detected, 1 entries May 14 00:47:43.719955 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 14 00:47:43.719961 kernel: printk: console [ttyAMA0] enabled May 14 00:47:43.719968 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 14 00:47:43.720104 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 14 00:47:43.720211 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 14 00:47:43.720743 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 14 00:47:43.720816 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 14 00:47:43.720874 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 14 00:47:43.720883 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 14 00:47:43.720890 kernel: PCI host bridge to bus 0000:00 May 14 00:47:43.720957 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 14 00:47:43.721014 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 14 00:47:43.721066 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 14 00:47:43.721125 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 14 00:47:43.721238 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 14 00:47:43.721311 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 14 00:47:43.721373 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 14 00:47:43.721432 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 14 00:47:43.721491 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:47:43.721552 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:47:43.721623 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 14 00:47:43.721686 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 14 00:47:43.721741 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 14 00:47:43.721794 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 14 00:47:43.721849 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 14 00:47:43.721857 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 14 00:47:43.721865 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 14 00:47:43.721873 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 14 00:47:43.721880 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 14 00:47:43.723746 kernel: iommu: Default domain type: Translated May 14 00:47:43.723756 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 14 00:47:43.723763 kernel: vgaarb: loaded May 14 00:47:43.723770 kernel: pps_core: LinuxPPS API ver. 1 registered May 14 00:47:43.723777 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 14 00:47:43.723783 kernel: PTP clock support registered May 14 00:47:43.723790 kernel: Registered efivars operations May 14 00:47:43.723800 kernel: clocksource: Switched to clocksource arch_sys_counter May 14 00:47:43.723807 kernel: VFS: Disk quotas dquot_6.6.0 May 14 00:47:43.723814 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 14 00:47:43.723820 kernel: pnp: PnP ACPI init May 14 00:47:43.723921 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 14 00:47:43.723932 kernel: pnp: PnP ACPI: found 1 devices May 14 00:47:43.723939 kernel: NET: Registered PF_INET protocol family May 14 00:47:43.723946 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 14 00:47:43.723955 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 14 00:47:43.723962 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 14 00:47:43.723969 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 14 00:47:43.723976 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 14 00:47:43.723982 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 14 00:47:43.723989 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:47:43.723996 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:47:43.724002 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 14 00:47:43.724009 kernel: PCI: CLS 0 bytes, default 64 May 14 00:47:43.724017 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 14 00:47:43.724024 kernel: kvm [1]: HYP mode not available May 14 00:47:43.724030 kernel: Initialise system trusted keyrings May 14 00:47:43.724037 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 14 00:47:43.724044 kernel: Key type asymmetric registered May 14 00:47:43.724050 kernel: Asymmetric key parser 'x509' registered May 14 00:47:43.724057 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 14 00:47:43.724063 kernel: io scheduler mq-deadline registered May 14 00:47:43.724070 kernel: io scheduler kyber registered May 14 00:47:43.724078 kernel: io scheduler bfq registered May 14 00:47:43.724085 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 14 00:47:43.724091 kernel: ACPI: button: Power Button [PWRB] May 14 00:47:43.724098 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 14 00:47:43.724190 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 14 00:47:43.724201 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 14 00:47:43.724208 kernel: thunder_xcv, ver 1.0 May 14 00:47:43.724215 kernel: thunder_bgx, ver 1.0 May 14 00:47:43.724221 kernel: nicpf, ver 1.0 May 14 00:47:43.724231 kernel: nicvf, ver 1.0 May 14 00:47:43.724312 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 14 00:47:43.724370 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-14T00:47:43 UTC (1747183663) May 14 00:47:43.724379 kernel: hid: raw HID events driver (C) Jiri Kosina May 14 00:47:43.724385 kernel: NET: Registered PF_INET6 protocol family May 14 00:47:43.724392 kernel: Segment Routing with IPv6 May 14 00:47:43.724399 kernel: In-situ OAM (IOAM) with IPv6 May 14 00:47:43.724405 kernel: NET: Registered PF_PACKET protocol family May 14 00:47:43.724414 kernel: Key type dns_resolver registered May 14 00:47:43.724420 kernel: registered taskstats version 1 May 14 00:47:43.724427 kernel: Loading compiled-in X.509 certificates May 14 00:47:43.724434 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 7727f4e7680a5b8534f3d5e7bb84b1f695e8c34b' May 14 00:47:43.724440 kernel: Key type .fscrypt registered May 14 00:47:43.724447 kernel: Key type fscrypt-provisioning registered May 14 00:47:43.724453 kernel: ima: No TPM chip found, activating TPM-bypass! May 14 00:47:43.724460 kernel: ima: Allocated hash algorithm: sha1 May 14 00:47:43.724467 kernel: ima: No architecture policies found May 14 00:47:43.724475 kernel: clk: Disabling unused clocks May 14 00:47:43.724481 kernel: Freeing unused kernel memory: 36480K May 14 00:47:43.724488 kernel: Run /init as init process May 14 00:47:43.724494 kernel: with arguments: May 14 00:47:43.724501 kernel: /init May 14 00:47:43.724507 kernel: with environment: May 14 00:47:43.724514 kernel: HOME=/ May 14 00:47:43.724520 kernel: TERM=linux May 14 00:47:43.724526 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 14 00:47:43.724536 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:47:43.724545 systemd[1]: Detected virtualization kvm. May 14 00:47:43.724552 systemd[1]: Detected architecture arm64. May 14 00:47:43.724559 systemd[1]: Running in initrd. May 14 00:47:43.724566 systemd[1]: No hostname configured, using default hostname. May 14 00:47:43.724573 systemd[1]: Hostname set to . May 14 00:47:43.724580 systemd[1]: Initializing machine ID from VM UUID. May 14 00:47:43.724589 systemd[1]: Queued start job for default target initrd.target. May 14 00:47:43.724596 systemd[1]: Started systemd-ask-password-console.path. May 14 00:47:43.724611 systemd[1]: Reached target cryptsetup.target. May 14 00:47:43.724618 systemd[1]: Reached target paths.target. May 14 00:47:43.724625 systemd[1]: Reached target slices.target. May 14 00:47:43.724631 systemd[1]: Reached target swap.target. May 14 00:47:43.724638 systemd[1]: Reached target timers.target. May 14 00:47:43.724646 systemd[1]: Listening on iscsid.socket. May 14 00:47:43.724655 systemd[1]: Listening on iscsiuio.socket. May 14 00:47:43.724662 systemd[1]: Listening on systemd-journald-audit.socket. May 14 00:47:43.724670 systemd[1]: Listening on systemd-journald-dev-log.socket. May 14 00:47:43.724677 systemd[1]: Listening on systemd-journald.socket. May 14 00:47:43.724684 systemd[1]: Listening on systemd-networkd.socket. May 14 00:47:43.724691 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:47:43.724698 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:47:43.724705 systemd[1]: Reached target sockets.target. May 14 00:47:43.724714 systemd[1]: Starting kmod-static-nodes.service... May 14 00:47:43.724721 systemd[1]: Finished network-cleanup.service. May 14 00:47:43.724728 systemd[1]: Starting systemd-fsck-usr.service... May 14 00:47:43.724735 systemd[1]: Starting systemd-journald.service... May 14 00:47:43.724742 systemd[1]: Starting systemd-modules-load.service... May 14 00:47:43.724749 systemd[1]: Starting systemd-resolved.service... May 14 00:47:43.724756 systemd[1]: Starting systemd-vconsole-setup.service... May 14 00:47:43.724763 systemd[1]: Finished kmod-static-nodes.service. May 14 00:47:43.724770 systemd[1]: Finished systemd-fsck-usr.service. May 14 00:47:43.724779 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:47:43.724786 systemd[1]: Finished systemd-vconsole-setup.service. May 14 00:47:43.724793 kernel: audit: type=1130 audit(1747183663.721:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.724800 systemd[1]: Starting dracut-cmdline-ask.service... May 14 00:47:43.724812 systemd-journald[290]: Journal started May 14 00:47:43.724861 systemd-journald[290]: Runtime Journal (/run/log/journal/781395cc4e9648ceb7b26d9a73e35ea4) is 6.0M, max 48.7M, 42.6M free. May 14 00:47:43.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.714635 systemd-modules-load[291]: Inserted module 'overlay' May 14 00:47:43.726203 systemd[1]: Started systemd-journald.service. May 14 00:47:43.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.727118 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:47:43.731919 kernel: audit: type=1130 audit(1747183663.726:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.731941 kernel: audit: type=1130 audit(1747183663.729:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.738187 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 14 00:47:43.742208 kernel: Bridge firewalling registered May 14 00:47:43.742259 systemd-modules-load[291]: Inserted module 'br_netfilter' May 14 00:47:43.742472 systemd[1]: Finished dracut-cmdline-ask.service. May 14 00:47:43.747297 kernel: audit: type=1130 audit(1747183663.743:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.742808 systemd-resolved[292]: Positive Trust Anchors: May 14 00:47:43.742816 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:47:43.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.742843 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:47:43.757079 kernel: audit: type=1130 audit(1747183663.748:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.757101 kernel: SCSI subsystem initialized May 14 00:47:43.744449 systemd[1]: Starting dracut-cmdline.service... May 14 00:47:43.747029 systemd-resolved[292]: Defaulting to hostname 'linux'. May 14 00:47:43.747851 systemd[1]: Started systemd-resolved.service. May 14 00:47:43.748942 systemd[1]: Reached target nss-lookup.target. May 14 00:47:43.760934 dracut-cmdline[309]: dracut-dracut-053 May 14 00:47:43.763179 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:47:43.767297 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 14 00:47:43.767319 kernel: device-mapper: uevent: version 1.0.3 May 14 00:47:43.767327 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 14 00:47:43.770315 systemd-modules-load[291]: Inserted module 'dm_multipath' May 14 00:47:43.771245 systemd[1]: Finished systemd-modules-load.service. May 14 00:47:43.774220 kernel: audit: type=1130 audit(1747183663.771:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.772695 systemd[1]: Starting systemd-sysctl.service... May 14 00:47:43.780966 systemd[1]: Finished systemd-sysctl.service. May 14 00:47:43.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.784172 kernel: audit: type=1130 audit(1747183663.781:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.826177 kernel: Loading iSCSI transport class v2.0-870. May 14 00:47:43.842184 kernel: iscsi: registered transport (tcp) May 14 00:47:43.856454 kernel: iscsi: registered transport (qla4xxx) May 14 00:47:43.856474 kernel: QLogic iSCSI HBA Driver May 14 00:47:43.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.893118 systemd[1]: Finished dracut-cmdline.service. May 14 00:47:43.896751 kernel: audit: type=1130 audit(1747183663.893:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:43.894732 systemd[1]: Starting dracut-pre-udev.service... May 14 00:47:43.948188 kernel: raid6: neonx8 gen() 13615 MB/s May 14 00:47:43.965178 kernel: raid6: neonx8 xor() 10755 MB/s May 14 00:47:43.982179 kernel: raid6: neonx4 gen() 13538 MB/s May 14 00:47:43.999175 kernel: raid6: neonx4 xor() 11169 MB/s May 14 00:47:44.016182 kernel: raid6: neonx2 gen() 13040 MB/s May 14 00:47:44.033179 kernel: raid6: neonx2 xor() 10308 MB/s May 14 00:47:44.050381 kernel: raid6: neonx1 gen() 10546 MB/s May 14 00:47:44.067182 kernel: raid6: neonx1 xor() 8777 MB/s May 14 00:47:44.084177 kernel: raid6: int64x8 gen() 6268 MB/s May 14 00:47:44.101395 kernel: raid6: int64x8 xor() 3544 MB/s May 14 00:47:44.118187 kernel: raid6: int64x4 gen() 7220 MB/s May 14 00:47:44.135176 kernel: raid6: int64x4 xor() 3851 MB/s May 14 00:47:44.152177 kernel: raid6: int64x2 gen() 6149 MB/s May 14 00:47:44.169177 kernel: raid6: int64x2 xor() 3320 MB/s May 14 00:47:44.186175 kernel: raid6: int64x1 gen() 5041 MB/s May 14 00:47:44.203522 kernel: raid6: int64x1 xor() 2647 MB/s May 14 00:47:44.203539 kernel: raid6: using algorithm neonx8 gen() 13615 MB/s May 14 00:47:44.203548 kernel: raid6: .... xor() 10755 MB/s, rmw enabled May 14 00:47:44.203557 kernel: raid6: using neon recovery algorithm May 14 00:47:44.214265 kernel: xor: measuring software checksum speed May 14 00:47:44.214284 kernel: 8regs : 17224 MB/sec May 14 00:47:44.215355 kernel: 32regs : 20712 MB/sec May 14 00:47:44.215371 kernel: arm64_neon : 27747 MB/sec May 14 00:47:44.215380 kernel: xor: using function: arm64_neon (27747 MB/sec) May 14 00:47:44.271186 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 14 00:47:44.281682 systemd[1]: Finished dracut-pre-udev.service. May 14 00:47:44.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:44.284000 audit: BPF prog-id=7 op=LOAD May 14 00:47:44.284000 audit: BPF prog-id=8 op=LOAD May 14 00:47:44.284917 systemd[1]: Starting systemd-udevd.service... May 14 00:47:44.285967 kernel: audit: type=1130 audit(1747183664.282:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:44.296777 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 14 00:47:44.300116 systemd[1]: Started systemd-udevd.service. May 14 00:47:44.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:44.301483 systemd[1]: Starting dracut-pre-trigger.service... May 14 00:47:44.312082 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation May 14 00:47:44.338886 systemd[1]: Finished dracut-pre-trigger.service. May 14 00:47:44.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:44.340389 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:47:44.377421 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:47:44.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:44.408248 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 14 00:47:44.412688 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 14 00:47:44.412702 kernel: GPT:9289727 != 19775487 May 14 00:47:44.412711 kernel: GPT:Alternate GPT header not at the end of the disk. May 14 00:47:44.412720 kernel: GPT:9289727 != 19775487 May 14 00:47:44.412728 kernel: GPT: Use GNU Parted to correct GPT errors. May 14 00:47:44.412742 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:47:44.429257 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 14 00:47:44.432191 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (552) May 14 00:47:44.433644 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 14 00:47:44.436294 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 14 00:47:44.437010 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 14 00:47:44.439119 systemd[1]: Starting disk-uuid.service... May 14 00:47:44.442964 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:47:44.449655 disk-uuid[565]: Primary Header is updated. May 14 00:47:44.449655 disk-uuid[565]: Secondary Entries is updated. May 14 00:47:44.449655 disk-uuid[565]: Secondary Header is updated. May 14 00:47:44.453187 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:47:44.460190 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:47:45.464137 disk-uuid[566]: The operation has completed successfully. May 14 00:47:45.465136 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:47:45.494713 systemd[1]: disk-uuid.service: Deactivated successfully. May 14 00:47:45.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.494812 systemd[1]: Finished disk-uuid.service. May 14 00:47:45.496269 systemd[1]: Starting verity-setup.service... May 14 00:47:45.511238 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 14 00:47:45.537569 systemd[1]: Found device dev-mapper-usr.device. May 14 00:47:45.539564 systemd[1]: Mounting sysusr-usr.mount... May 14 00:47:45.542143 systemd[1]: Finished verity-setup.service. May 14 00:47:45.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.589175 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 14 00:47:45.589143 systemd[1]: Mounted sysusr-usr.mount. May 14 00:47:45.589811 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 14 00:47:45.590536 systemd[1]: Starting ignition-setup.service... May 14 00:47:45.592201 systemd[1]: Starting parse-ip-for-networkd.service... May 14 00:47:45.599183 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:47:45.599222 kernel: BTRFS info (device vda6): using free space tree May 14 00:47:45.599232 kernel: BTRFS info (device vda6): has skinny extents May 14 00:47:45.607012 systemd[1]: mnt-oem.mount: Deactivated successfully. May 14 00:47:45.613739 systemd[1]: Finished ignition-setup.service. May 14 00:47:45.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.615110 systemd[1]: Starting ignition-fetch-offline.service... May 14 00:47:45.683316 systemd[1]: Finished parse-ip-for-networkd.service. May 14 00:47:45.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.686000 audit: BPF prog-id=9 op=LOAD May 14 00:47:45.687485 systemd[1]: Starting systemd-networkd.service... May 14 00:47:45.700884 ignition[653]: Ignition 2.14.0 May 14 00:47:45.700894 ignition[653]: Stage: fetch-offline May 14 00:47:45.700933 ignition[653]: no configs at "/usr/lib/ignition/base.d" May 14 00:47:45.700942 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:45.701074 ignition[653]: parsed url from cmdline: "" May 14 00:47:45.701077 ignition[653]: no config URL provided May 14 00:47:45.701081 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" May 14 00:47:45.701088 ignition[653]: no config at "/usr/lib/ignition/user.ign" May 14 00:47:45.701105 ignition[653]: op(1): [started] loading QEMU firmware config module May 14 00:47:45.701110 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" May 14 00:47:45.713673 ignition[653]: op(1): [finished] loading QEMU firmware config module May 14 00:47:45.715456 systemd-networkd[742]: lo: Link UP May 14 00:47:45.715470 systemd-networkd[742]: lo: Gained carrier May 14 00:47:45.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.715845 systemd-networkd[742]: Enumeration completed May 14 00:47:45.715934 systemd[1]: Started systemd-networkd.service. May 14 00:47:45.717086 systemd[1]: Reached target network.target. May 14 00:47:45.718514 systemd-networkd[742]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:47:45.719241 systemd[1]: Starting iscsiuio.service... May 14 00:47:45.720871 systemd-networkd[742]: eth0: Link UP May 14 00:47:45.725401 ignition[653]: parsing config with SHA512: 0cd3cdcee27e9f3854b5daa37bef3788281b66eabf17726f0769a8242458dba9d62694a4f4559c69417087f84ef2fd32bf05c4c17328aa7774bffa2a49ef4d9c May 14 00:47:45.720874 systemd-networkd[742]: eth0: Gained carrier May 14 00:47:45.732646 systemd[1]: Started iscsiuio.service. May 14 00:47:45.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.733634 unknown[653]: fetched base config from "system" May 14 00:47:45.733644 unknown[653]: fetched user config from "qemu" May 14 00:47:45.734055 ignition[653]: fetch-offline: fetch-offline passed May 14 00:47:45.734210 systemd[1]: Starting iscsid.service... May 14 00:47:45.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.734127 ignition[653]: Ignition finished successfully May 14 00:47:45.735595 systemd[1]: Finished ignition-fetch-offline.service. May 14 00:47:45.738856 iscsid[749]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 14 00:47:45.738856 iscsid[749]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 14 00:47:45.738856 iscsid[749]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 14 00:47:45.738856 iscsid[749]: If using hardware iscsi like qla4xxx this message can be ignored. May 14 00:47:45.738856 iscsid[749]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 14 00:47:45.738856 iscsid[749]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 14 00:47:45.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.736774 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 14 00:47:45.737502 systemd[1]: Starting ignition-kargs.service... May 14 00:47:45.742927 systemd[1]: Started iscsid.service. May 14 00:47:45.745075 systemd[1]: Starting dracut-initqueue.service... May 14 00:47:45.750548 ignition[750]: Ignition 2.14.0 May 14 00:47:45.749248 systemd-networkd[742]: eth0: DHCPv4 address 10.0.0.102/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:47:45.750554 ignition[750]: Stage: kargs May 14 00:47:45.752909 systemd[1]: Finished ignition-kargs.service. May 14 00:47:45.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.750656 ignition[750]: no configs at "/usr/lib/ignition/base.d" May 14 00:47:45.750667 ignition[750]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:45.754597 systemd[1]: Starting ignition-disks.service... May 14 00:47:45.751311 ignition[750]: kargs: kargs passed May 14 00:47:45.751348 ignition[750]: Ignition finished successfully May 14 00:47:45.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.761296 ignition[762]: Ignition 2.14.0 May 14 00:47:45.758829 systemd[1]: Finished dracut-initqueue.service. May 14 00:47:45.761301 ignition[762]: Stage: disks May 14 00:47:45.759539 systemd[1]: Reached target remote-fs-pre.target. May 14 00:47:45.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.761385 ignition[762]: no configs at "/usr/lib/ignition/base.d" May 14 00:47:45.760149 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:47:45.761394 ignition[762]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:45.760783 systemd[1]: Reached target remote-fs.target. May 14 00:47:45.762388 ignition[762]: disks: disks passed May 14 00:47:45.762040 systemd[1]: Starting dracut-pre-mount.service... May 14 00:47:45.762429 ignition[762]: Ignition finished successfully May 14 00:47:45.765313 systemd[1]: Finished ignition-disks.service. May 14 00:47:45.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.766045 systemd[1]: Reached target initrd-root-device.target. May 14 00:47:45.766726 systemd[1]: Reached target local-fs-pre.target. May 14 00:47:45.767817 systemd[1]: Reached target local-fs.target. May 14 00:47:45.768840 systemd[1]: Reached target sysinit.target. May 14 00:47:45.770039 systemd[1]: Reached target basic.target. May 14 00:47:45.772372 systemd[1]: Finished dracut-pre-mount.service. May 14 00:47:45.773922 systemd[1]: Starting systemd-fsck-root.service... May 14 00:47:45.785307 systemd-fsck[777]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 14 00:47:45.788843 systemd[1]: Finished systemd-fsck-root.service. May 14 00:47:45.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.793342 systemd[1]: Mounting sysroot.mount... May 14 00:47:45.799185 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 14 00:47:45.799661 systemd[1]: Mounted sysroot.mount. May 14 00:47:45.800258 systemd[1]: Reached target initrd-root-fs.target. May 14 00:47:45.802052 systemd[1]: Mounting sysroot-usr.mount... May 14 00:47:45.802809 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 14 00:47:45.802844 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 14 00:47:45.802869 systemd[1]: Reached target ignition-diskful.target. May 14 00:47:45.804544 systemd[1]: Mounted sysroot-usr.mount. May 14 00:47:45.806995 systemd[1]: Starting initrd-setup-root.service... May 14 00:47:45.811184 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory May 14 00:47:45.815567 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory May 14 00:47:45.819917 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory May 14 00:47:45.824062 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory May 14 00:47:45.850078 systemd[1]: Finished initrd-setup-root.service. May 14 00:47:45.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.851541 systemd[1]: Starting ignition-mount.service... May 14 00:47:45.852705 systemd[1]: Starting sysroot-boot.service... May 14 00:47:45.856712 bash[828]: umount: /sysroot/usr/share/oem: not mounted. May 14 00:47:45.864732 ignition[830]: INFO : Ignition 2.14.0 May 14 00:47:45.864732 ignition[830]: INFO : Stage: mount May 14 00:47:45.866554 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:47:45.866554 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:45.866554 ignition[830]: INFO : mount: mount passed May 14 00:47:45.866554 ignition[830]: INFO : Ignition finished successfully May 14 00:47:45.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:45.867728 systemd[1]: Finished ignition-mount.service. May 14 00:47:45.872593 systemd[1]: Finished sysroot-boot.service. May 14 00:47:45.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:46.548123 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 14 00:47:46.554191 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (839) May 14 00:47:46.556189 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:47:46.556271 kernel: BTRFS info (device vda6): using free space tree May 14 00:47:46.556336 kernel: BTRFS info (device vda6): has skinny extents May 14 00:47:46.559033 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 14 00:47:46.560390 systemd[1]: Starting ignition-files.service... May 14 00:47:46.574109 ignition[859]: INFO : Ignition 2.14.0 May 14 00:47:46.574109 ignition[859]: INFO : Stage: files May 14 00:47:46.575543 ignition[859]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:47:46.575543 ignition[859]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:46.575543 ignition[859]: DEBUG : files: compiled without relabeling support, skipping May 14 00:47:46.579829 ignition[859]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 14 00:47:46.579829 ignition[859]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 14 00:47:46.584764 ignition[859]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 14 00:47:46.585875 ignition[859]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 14 00:47:46.585875 ignition[859]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 14 00:47:46.585428 unknown[859]: wrote ssh authorized keys file for user: core May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:47:46.589198 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 14 00:47:46.915822 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 14 00:47:47.309309 systemd-networkd[742]: eth0: Gained IPv6LL May 14 00:47:47.548468 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 14 00:47:47.550012 ignition[859]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 14 00:47:47.550994 ignition[859]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:47:47.552486 ignition[859]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:47:47.552486 ignition[859]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 14 00:47:47.552486 ignition[859]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 14 00:47:47.552486 ignition[859]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:47:47.584517 ignition[859]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:47:47.585661 ignition[859]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 14 00:47:47.585661 ignition[859]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 14 00:47:47.585661 ignition[859]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 14 00:47:47.585661 ignition[859]: INFO : files: files passed May 14 00:47:47.585661 ignition[859]: INFO : Ignition finished successfully May 14 00:47:47.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.586028 systemd[1]: Finished ignition-files.service. May 14 00:47:47.588329 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 14 00:47:47.593582 initrd-setup-root-after-ignition[884]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 14 00:47:47.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.589169 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 14 00:47:47.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.596905 initrd-setup-root-after-ignition[886]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 14 00:47:47.589793 systemd[1]: Starting ignition-quench.service... May 14 00:47:47.592903 systemd[1]: ignition-quench.service: Deactivated successfully. May 14 00:47:47.592988 systemd[1]: Finished ignition-quench.service. May 14 00:47:47.594777 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 14 00:47:47.595740 systemd[1]: Reached target ignition-complete.target. May 14 00:47:47.598017 systemd[1]: Starting initrd-parse-etc.service... May 14 00:47:47.609860 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 14 00:47:47.609943 systemd[1]: Finished initrd-parse-etc.service. May 14 00:47:47.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.611201 systemd[1]: Reached target initrd-fs.target. May 14 00:47:47.612082 systemd[1]: Reached target initrd.target. May 14 00:47:47.613065 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 14 00:47:47.613743 systemd[1]: Starting dracut-pre-pivot.service... May 14 00:47:47.623851 systemd[1]: Finished dracut-pre-pivot.service. May 14 00:47:47.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.625232 systemd[1]: Starting initrd-cleanup.service... May 14 00:47:47.633088 systemd[1]: Stopped target nss-lookup.target. May 14 00:47:47.633786 systemd[1]: Stopped target remote-cryptsetup.target. May 14 00:47:47.634865 systemd[1]: Stopped target timers.target. May 14 00:47:47.635855 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 14 00:47:47.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.635955 systemd[1]: Stopped dracut-pre-pivot.service. May 14 00:47:47.636882 systemd[1]: Stopped target initrd.target. May 14 00:47:47.637858 systemd[1]: Stopped target basic.target. May 14 00:47:47.638777 systemd[1]: Stopped target ignition-complete.target. May 14 00:47:47.639811 systemd[1]: Stopped target ignition-diskful.target. May 14 00:47:47.640850 systemd[1]: Stopped target initrd-root-device.target. May 14 00:47:47.641945 systemd[1]: Stopped target remote-fs.target. May 14 00:47:47.642939 systemd[1]: Stopped target remote-fs-pre.target. May 14 00:47:47.643992 systemd[1]: Stopped target sysinit.target. May 14 00:47:47.644932 systemd[1]: Stopped target local-fs.target. May 14 00:47:47.645906 systemd[1]: Stopped target local-fs-pre.target. May 14 00:47:47.646853 systemd[1]: Stopped target swap.target. May 14 00:47:47.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.647834 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 14 00:47:47.647933 systemd[1]: Stopped dracut-pre-mount.service. May 14 00:47:47.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.648921 systemd[1]: Stopped target cryptsetup.target. May 14 00:47:47.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.649752 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 14 00:47:47.649844 systemd[1]: Stopped dracut-initqueue.service. May 14 00:47:47.650920 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 14 00:47:47.651010 systemd[1]: Stopped ignition-fetch-offline.service. May 14 00:47:47.651947 systemd[1]: Stopped target paths.target. May 14 00:47:47.652798 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 14 00:47:47.656215 systemd[1]: Stopped systemd-ask-password-console.path. May 14 00:47:47.657110 systemd[1]: Stopped target slices.target. May 14 00:47:47.658143 systemd[1]: Stopped target sockets.target. May 14 00:47:47.659091 systemd[1]: iscsid.socket: Deactivated successfully. May 14 00:47:47.659179 systemd[1]: Closed iscsid.socket. May 14 00:47:47.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.660019 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 14 00:47:47.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.660115 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 14 00:47:47.661175 systemd[1]: ignition-files.service: Deactivated successfully. May 14 00:47:47.661266 systemd[1]: Stopped ignition-files.service. May 14 00:47:47.662770 systemd[1]: Stopping ignition-mount.service... May 14 00:47:47.664002 systemd[1]: Stopping iscsiuio.service... May 14 00:47:47.666357 systemd[1]: Stopping sysroot-boot.service... May 14 00:47:47.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.667176 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 14 00:47:47.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.667286 systemd[1]: Stopped systemd-udev-trigger.service. May 14 00:47:47.668339 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 14 00:47:47.671203 ignition[899]: INFO : Ignition 2.14.0 May 14 00:47:47.671203 ignition[899]: INFO : Stage: umount May 14 00:47:47.671203 ignition[899]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:47:47.671203 ignition[899]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:47:47.671203 ignition[899]: INFO : umount: umount passed May 14 00:47:47.671203 ignition[899]: INFO : Ignition finished successfully May 14 00:47:47.668435 systemd[1]: Stopped dracut-pre-trigger.service. May 14 00:47:47.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.672697 systemd[1]: iscsiuio.service: Deactivated successfully. May 14 00:47:47.673489 systemd[1]: Stopped iscsiuio.service. May 14 00:47:47.676667 systemd[1]: ignition-mount.service: Deactivated successfully. May 14 00:47:47.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.676748 systemd[1]: Stopped ignition-mount.service. May 14 00:47:47.678958 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 14 00:47:47.679542 systemd[1]: Stopped target network.target. May 14 00:47:47.680859 systemd[1]: iscsiuio.socket: Deactivated successfully. May 14 00:47:47.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.680898 systemd[1]: Closed iscsiuio.socket. May 14 00:47:47.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.682042 systemd[1]: ignition-disks.service: Deactivated successfully. May 14 00:47:47.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.682092 systemd[1]: Stopped ignition-disks.service. May 14 00:47:47.683268 systemd[1]: ignition-kargs.service: Deactivated successfully. May 14 00:47:47.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.683312 systemd[1]: Stopped ignition-kargs.service. May 14 00:47:47.684573 systemd[1]: ignition-setup.service: Deactivated successfully. May 14 00:47:47.684614 systemd[1]: Stopped ignition-setup.service. May 14 00:47:47.685553 systemd[1]: Stopping systemd-networkd.service... May 14 00:47:47.686716 systemd[1]: Stopping systemd-resolved.service... May 14 00:47:47.688109 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 14 00:47:47.688222 systemd[1]: Finished initrd-cleanup.service. May 14 00:47:47.693217 systemd-networkd[742]: eth0: DHCPv6 lease lost May 14 00:47:47.694271 systemd[1]: systemd-networkd.service: Deactivated successfully. May 14 00:47:47.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.694372 systemd[1]: Stopped systemd-networkd.service. May 14 00:47:47.695603 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 14 00:47:47.695632 systemd[1]: Closed systemd-networkd.socket. May 14 00:47:47.697395 systemd[1]: Stopping network-cleanup.service... May 14 00:47:47.699000 audit: BPF prog-id=9 op=UNLOAD May 14 00:47:47.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.698489 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 14 00:47:47.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.698547 systemd[1]: Stopped parse-ip-for-networkd.service. May 14 00:47:47.699921 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 14 00:47:47.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.699963 systemd[1]: Stopped systemd-sysctl.service. May 14 00:47:47.701966 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 14 00:47:47.702007 systemd[1]: Stopped systemd-modules-load.service. May 14 00:47:47.703632 systemd[1]: Stopping systemd-udevd.service... May 14 00:47:47.708101 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 14 00:47:47.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.708620 systemd[1]: systemd-resolved.service: Deactivated successfully. May 14 00:47:47.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.708719 systemd[1]: Stopped systemd-resolved.service. May 14 00:47:47.710117 systemd[1]: sysroot-boot.service: Deactivated successfully. May 14 00:47:47.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.710231 systemd[1]: Stopped sysroot-boot.service. May 14 00:47:47.711887 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 14 00:47:47.711932 systemd[1]: Stopped initrd-setup-root.service. May 14 00:47:47.715000 audit: BPF prog-id=6 op=UNLOAD May 14 00:47:47.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.714923 systemd[1]: network-cleanup.service: Deactivated successfully. May 14 00:47:47.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.715012 systemd[1]: Stopped network-cleanup.service. May 14 00:47:47.716079 systemd[1]: systemd-udevd.service: Deactivated successfully. May 14 00:47:47.716206 systemd[1]: Stopped systemd-udevd.service. May 14 00:47:47.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.717261 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 14 00:47:47.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.717292 systemd[1]: Closed systemd-udevd-control.socket. May 14 00:47:47.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.718373 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 14 00:47:47.718404 systemd[1]: Closed systemd-udevd-kernel.socket. May 14 00:47:47.719509 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 14 00:47:47.719550 systemd[1]: Stopped dracut-pre-udev.service. May 14 00:47:47.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.720791 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 14 00:47:47.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.720829 systemd[1]: Stopped dracut-cmdline.service. May 14 00:47:47.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.721924 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 14 00:47:47.721961 systemd[1]: Stopped dracut-cmdline-ask.service. May 14 00:47:47.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.723923 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 14 00:47:47.725189 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 14 00:47:47.725246 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 14 00:47:47.727108 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 14 00:47:47.727147 systemd[1]: Stopped kmod-static-nodes.service. May 14 00:47:47.728562 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 14 00:47:47.728600 systemd[1]: Stopped systemd-vconsole-setup.service. May 14 00:47:47.730612 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 14 00:47:47.731008 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 14 00:47:47.731086 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 14 00:47:47.732090 systemd[1]: Reached target initrd-switch-root.target. May 14 00:47:47.733893 systemd[1]: Starting initrd-switch-root.service... May 14 00:47:47.739922 systemd[1]: Switching root. May 14 00:47:47.759506 iscsid[749]: iscsid shutting down. May 14 00:47:47.760028 systemd-journald[290]: Journal stopped May 14 00:47:49.702839 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 14 00:47:49.702895 kernel: SELinux: Class mctp_socket not defined in policy. May 14 00:47:49.702907 kernel: SELinux: Class anon_inode not defined in policy. May 14 00:47:49.702917 kernel: SELinux: the above unknown classes and permissions will be allowed May 14 00:47:49.702927 kernel: SELinux: policy capability network_peer_controls=1 May 14 00:47:49.702936 kernel: SELinux: policy capability open_perms=1 May 14 00:47:49.702950 kernel: SELinux: policy capability extended_socket_class=1 May 14 00:47:49.702960 kernel: SELinux: policy capability always_check_network=0 May 14 00:47:49.702972 kernel: SELinux: policy capability cgroup_seclabel=1 May 14 00:47:49.702983 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 14 00:47:49.702993 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 14 00:47:49.703003 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 14 00:47:49.703013 systemd[1]: Successfully loaded SELinux policy in 32.481ms. May 14 00:47:49.703031 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.137ms. May 14 00:47:49.703042 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:47:49.703056 systemd[1]: Detected virtualization kvm. May 14 00:47:49.703067 systemd[1]: Detected architecture arm64. May 14 00:47:49.703078 systemd[1]: Detected first boot. May 14 00:47:49.703099 systemd[1]: Initializing machine ID from VM UUID. May 14 00:47:49.703111 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 14 00:47:49.703120 systemd[1]: Populated /etc with preset unit settings. May 14 00:47:49.703132 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:47:49.703143 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:47:49.703162 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:47:49.703175 kernel: kauditd_printk_skb: 80 callbacks suppressed May 14 00:47:49.703187 kernel: audit: type=1334 audit(1747183669.583:84): prog-id=12 op=LOAD May 14 00:47:49.703198 kernel: audit: type=1334 audit(1747183669.583:85): prog-id=3 op=UNLOAD May 14 00:47:49.703207 kernel: audit: type=1334 audit(1747183669.583:86): prog-id=13 op=LOAD May 14 00:47:49.703217 kernel: audit: type=1334 audit(1747183669.584:87): prog-id=14 op=LOAD May 14 00:47:49.703226 kernel: audit: type=1334 audit(1747183669.584:88): prog-id=4 op=UNLOAD May 14 00:47:49.703236 kernel: audit: type=1334 audit(1747183669.584:89): prog-id=5 op=UNLOAD May 14 00:47:49.703246 kernel: audit: type=1334 audit(1747183669.585:90): prog-id=15 op=LOAD May 14 00:47:49.703255 kernel: audit: type=1334 audit(1747183669.585:91): prog-id=12 op=UNLOAD May 14 00:47:49.703267 kernel: audit: type=1334 audit(1747183669.586:92): prog-id=16 op=LOAD May 14 00:47:49.703278 kernel: audit: type=1334 audit(1747183669.586:93): prog-id=17 op=LOAD May 14 00:47:49.703289 systemd[1]: iscsid.service: Deactivated successfully. May 14 00:47:49.703299 systemd[1]: Stopped iscsid.service. May 14 00:47:49.703310 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 14 00:47:49.703320 systemd[1]: Stopped initrd-switch-root.service. May 14 00:47:49.703330 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 14 00:47:49.703344 systemd[1]: Created slice system-addon\x2dconfig.slice. May 14 00:47:49.703355 systemd[1]: Created slice system-addon\x2drun.slice. May 14 00:47:49.703366 systemd[1]: Created slice system-getty.slice. May 14 00:47:49.703377 systemd[1]: Created slice system-modprobe.slice. May 14 00:47:49.703387 systemd[1]: Created slice system-serial\x2dgetty.slice. May 14 00:47:49.703398 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 14 00:47:49.703410 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 14 00:47:49.703420 systemd[1]: Created slice user.slice. May 14 00:47:49.703431 systemd[1]: Started systemd-ask-password-console.path. May 14 00:47:49.703442 systemd[1]: Started systemd-ask-password-wall.path. May 14 00:47:49.703453 systemd[1]: Set up automount boot.automount. May 14 00:47:49.703464 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 14 00:47:49.703476 systemd[1]: Stopped target initrd-switch-root.target. May 14 00:47:49.703486 systemd[1]: Stopped target initrd-fs.target. May 14 00:47:49.703497 systemd[1]: Stopped target initrd-root-fs.target. May 14 00:47:49.703507 systemd[1]: Reached target integritysetup.target. May 14 00:47:49.703519 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:47:49.703529 systemd[1]: Reached target remote-fs.target. May 14 00:47:49.703539 systemd[1]: Reached target slices.target. May 14 00:47:49.703550 systemd[1]: Reached target swap.target. May 14 00:47:49.703560 systemd[1]: Reached target torcx.target. May 14 00:47:49.703570 systemd[1]: Reached target veritysetup.target. May 14 00:47:49.703581 systemd[1]: Listening on systemd-coredump.socket. May 14 00:47:49.703592 systemd[1]: Listening on systemd-initctl.socket. May 14 00:47:49.703603 systemd[1]: Listening on systemd-networkd.socket. May 14 00:47:49.703613 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:47:49.703625 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:47:49.703635 systemd[1]: Listening on systemd-userdbd.socket. May 14 00:47:49.703646 systemd[1]: Mounting dev-hugepages.mount... May 14 00:47:49.703661 systemd[1]: Mounting dev-mqueue.mount... May 14 00:47:49.703692 systemd[1]: Mounting media.mount... May 14 00:47:49.703702 systemd[1]: Mounting sys-kernel-debug.mount... May 14 00:47:49.703712 systemd[1]: Mounting sys-kernel-tracing.mount... May 14 00:47:49.703722 systemd[1]: Mounting tmp.mount... May 14 00:47:49.703734 systemd[1]: Starting flatcar-tmpfiles.service... May 14 00:47:49.703746 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:47:49.703757 systemd[1]: Starting kmod-static-nodes.service... May 14 00:47:49.703767 systemd[1]: Starting modprobe@configfs.service... May 14 00:47:49.703778 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:47:49.703788 systemd[1]: Starting modprobe@drm.service... May 14 00:47:49.703800 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:47:49.703810 systemd[1]: Starting modprobe@fuse.service... May 14 00:47:49.703820 systemd[1]: Starting modprobe@loop.service... May 14 00:47:49.703831 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 14 00:47:49.703843 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 14 00:47:49.703854 systemd[1]: Stopped systemd-fsck-root.service. May 14 00:47:49.703865 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 14 00:47:49.703875 systemd[1]: Stopped systemd-fsck-usr.service. May 14 00:47:49.703885 systemd[1]: Stopped systemd-journald.service. May 14 00:47:49.703895 kernel: fuse: init (API version 7.34) May 14 00:47:49.703906 kernel: loop: module loaded May 14 00:47:49.703917 systemd[1]: Starting systemd-journald.service... May 14 00:47:49.703927 systemd[1]: Starting systemd-modules-load.service... May 14 00:47:49.703940 systemd[1]: Starting systemd-network-generator.service... May 14 00:47:49.703950 systemd[1]: Starting systemd-remount-fs.service... May 14 00:47:49.703960 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:47:49.703971 systemd[1]: verity-setup.service: Deactivated successfully. May 14 00:47:49.703981 systemd[1]: Stopped verity-setup.service. May 14 00:47:49.703992 systemd[1]: Mounted dev-hugepages.mount. May 14 00:47:49.704003 systemd[1]: Mounted dev-mqueue.mount. May 14 00:47:49.704015 systemd[1]: Mounted media.mount. May 14 00:47:49.704025 systemd[1]: Mounted sys-kernel-debug.mount. May 14 00:47:49.704037 systemd[1]: Mounted sys-kernel-tracing.mount. May 14 00:47:49.704047 systemd[1]: Mounted tmp.mount. May 14 00:47:49.704057 systemd[1]: Finished kmod-static-nodes.service. May 14 00:47:49.704068 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 14 00:47:49.704079 systemd[1]: Finished modprobe@configfs.service. May 14 00:47:49.704090 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:47:49.704101 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:47:49.704112 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:47:49.704123 systemd[1]: Finished modprobe@drm.service. May 14 00:47:49.704134 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:47:49.704147 systemd-journald[998]: Journal started May 14 00:47:49.704196 systemd-journald[998]: Runtime Journal (/run/log/journal/781395cc4e9648ceb7b26d9a73e35ea4) is 6.0M, max 48.7M, 42.6M free. May 14 00:47:47.822000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 14 00:47:47.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:47:47.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:47:47.890000 audit: BPF prog-id=10 op=LOAD May 14 00:47:47.890000 audit: BPF prog-id=10 op=UNLOAD May 14 00:47:47.890000 audit: BPF prog-id=11 op=LOAD May 14 00:47:47.890000 audit: BPF prog-id=11 op=UNLOAD May 14 00:47:47.932000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 14 00:47:47.932000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400018d8d2 a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:47.932000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:47:47.933000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 14 00:47:47.933000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400018d9a9 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:47.933000 audit: CWD cwd="/" May 14 00:47:47.933000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:47.933000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:47:47.933000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:47:49.583000 audit: BPF prog-id=12 op=LOAD May 14 00:47:49.583000 audit: BPF prog-id=3 op=UNLOAD May 14 00:47:49.583000 audit: BPF prog-id=13 op=LOAD May 14 00:47:49.584000 audit: BPF prog-id=14 op=LOAD May 14 00:47:49.584000 audit: BPF prog-id=4 op=UNLOAD May 14 00:47:49.584000 audit: BPF prog-id=5 op=UNLOAD May 14 00:47:49.585000 audit: BPF prog-id=15 op=LOAD May 14 00:47:49.585000 audit: BPF prog-id=12 op=UNLOAD May 14 00:47:49.586000 audit: BPF prog-id=16 op=LOAD May 14 00:47:49.586000 audit: BPF prog-id=17 op=LOAD May 14 00:47:49.586000 audit: BPF prog-id=13 op=UNLOAD May 14 00:47:49.586000 audit: BPF prog-id=14 op=UNLOAD May 14 00:47:49.587000 audit: BPF prog-id=18 op=LOAD May 14 00:47:49.587000 audit: BPF prog-id=15 op=UNLOAD May 14 00:47:49.588000 audit: BPF prog-id=19 op=LOAD May 14 00:47:49.588000 audit: BPF prog-id=20 op=LOAD May 14 00:47:49.588000 audit: BPF prog-id=16 op=UNLOAD May 14 00:47:49.588000 audit: BPF prog-id=17 op=UNLOAD May 14 00:47:49.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.598000 audit: BPF prog-id=18 op=UNLOAD May 14 00:47:49.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.669000 audit: BPF prog-id=21 op=LOAD May 14 00:47:49.669000 audit: BPF prog-id=22 op=LOAD May 14 00:47:49.669000 audit: BPF prog-id=23 op=LOAD May 14 00:47:49.669000 audit: BPF prog-id=19 op=UNLOAD May 14 00:47:49.669000 audit: BPF prog-id=20 op=UNLOAD May 14 00:47:49.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.705252 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:47:49.695000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 14 00:47:49.695000 audit[998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffffd1fa940 a2=4000 a3=1 items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:49.695000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 14 00:47:49.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.581998 systemd[1]: Queued start job for default target multi-user.target. May 14 00:47:47.930864 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:47:49.582010 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 14 00:47:47.931141 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:47:49.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.589444 systemd[1]: systemd-journald.service: Deactivated successfully. May 14 00:47:47.931170 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:47:47.931200 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 14 00:47:47.931209 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="skipped missing lower profile" missing profile=oem May 14 00:47:47.931237 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 14 00:47:47.931248 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 14 00:47:47.931437 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 14 00:47:49.706453 systemd[1]: Started systemd-journald.service. May 14 00:47:47.931475 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:47:47.931486 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:47:47.931916 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 14 00:47:47.931948 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 14 00:47:47.931965 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 14 00:47:47.931979 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 14 00:47:49.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:47.931996 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 14 00:47:47.932009 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 14 00:47:49.345118 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:47:49.345411 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:47:49.345531 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:47:49.345720 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:47:49.345770 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 14 00:47:49.345825 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-14T00:47:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 14 00:47:49.707699 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 14 00:47:49.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.708049 systemd[1]: Finished modprobe@fuse.service. May 14 00:47:49.709016 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:47:49.709151 systemd[1]: Finished modprobe@loop.service. May 14 00:47:49.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.710039 systemd[1]: Finished systemd-modules-load.service. May 14 00:47:49.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.711135 systemd[1]: Finished flatcar-tmpfiles.service. May 14 00:47:49.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.712030 systemd[1]: Finished systemd-network-generator.service. May 14 00:47:49.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.713118 systemd[1]: Finished systemd-remount-fs.service. May 14 00:47:49.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.714410 systemd[1]: Reached target network-pre.target. May 14 00:47:49.716353 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 14 00:47:49.717990 systemd[1]: Mounting sys-kernel-config.mount... May 14 00:47:49.718668 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 14 00:47:49.721743 systemd[1]: Starting systemd-hwdb-update.service... May 14 00:47:49.723480 systemd[1]: Starting systemd-journal-flush.service... May 14 00:47:49.724209 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:47:49.725270 systemd[1]: Starting systemd-random-seed.service... May 14 00:47:49.725991 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:47:49.726984 systemd[1]: Starting systemd-sysctl.service... May 14 00:47:49.728664 systemd[1]: Starting systemd-sysusers.service... May 14 00:47:49.731036 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 14 00:47:49.732780 systemd[1]: Mounted sys-kernel-config.mount. May 14 00:47:49.733722 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:47:49.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.735973 systemd[1]: Starting systemd-udev-settle.service... May 14 00:47:49.736834 systemd-journald[998]: Time spent on flushing to /var/log/journal/781395cc4e9648ceb7b26d9a73e35ea4 is 14.030ms for 993 entries. May 14 00:47:49.736834 systemd-journald[998]: System Journal (/var/log/journal/781395cc4e9648ceb7b26d9a73e35ea4) is 8.0M, max 195.6M, 187.6M free. May 14 00:47:49.764971 systemd-journald[998]: Received client request to flush runtime journal. May 14 00:47:49.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:49.767567 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 14 00:47:49.739565 systemd[1]: Finished systemd-random-seed.service. May 14 00:47:49.740412 systemd[1]: Reached target first-boot-complete.target. May 14 00:47:49.751496 systemd[1]: Finished systemd-sysctl.service. May 14 00:47:49.752786 systemd[1]: Finished systemd-sysusers.service. May 14 00:47:49.755457 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:47:49.766338 systemd[1]: Finished systemd-journal-flush.service. May 14 00:47:49.774229 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:47:49.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.095823 systemd[1]: Finished systemd-hwdb-update.service. May 14 00:47:50.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.098067 systemd[1]: Starting systemd-udevd.service... May 14 00:47:50.097000 audit: BPF prog-id=24 op=LOAD May 14 00:47:50.097000 audit: BPF prog-id=25 op=LOAD May 14 00:47:50.097000 audit: BPF prog-id=7 op=UNLOAD May 14 00:47:50.097000 audit: BPF prog-id=8 op=UNLOAD May 14 00:47:50.118103 systemd-udevd[1037]: Using default interface naming scheme 'v252'. May 14 00:47:50.129877 systemd[1]: Started systemd-udevd.service. May 14 00:47:50.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.131000 audit: BPF prog-id=26 op=LOAD May 14 00:47:50.133638 systemd[1]: Starting systemd-networkd.service... May 14 00:47:50.136000 audit: BPF prog-id=27 op=LOAD May 14 00:47:50.136000 audit: BPF prog-id=28 op=LOAD May 14 00:47:50.137000 audit: BPF prog-id=29 op=LOAD May 14 00:47:50.137755 systemd[1]: Starting systemd-userdbd.service... May 14 00:47:50.147768 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 14 00:47:50.169220 systemd[1]: Started systemd-userdbd.service. May 14 00:47:50.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.222113 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:47:50.225839 systemd-networkd[1047]: lo: Link UP May 14 00:47:50.225849 systemd-networkd[1047]: lo: Gained carrier May 14 00:47:50.226196 systemd-networkd[1047]: Enumeration completed May 14 00:47:50.226289 systemd[1]: Started systemd-networkd.service. May 14 00:47:50.226291 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:47:50.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.228024 systemd-networkd[1047]: eth0: Link UP May 14 00:47:50.228035 systemd-networkd[1047]: eth0: Gained carrier May 14 00:47:50.231552 systemd[1]: Finished systemd-udev-settle.service. May 14 00:47:50.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.233871 systemd[1]: Starting lvm2-activation-early.service... May 14 00:47:50.242212 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:47:50.251309 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.102/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:47:50.276075 systemd[1]: Finished lvm2-activation-early.service. May 14 00:47:50.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.277173 systemd[1]: Reached target cryptsetup.target. May 14 00:47:50.279184 systemd[1]: Starting lvm2-activation.service... May 14 00:47:50.282877 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:47:50.310076 systemd[1]: Finished lvm2-activation.service. May 14 00:47:50.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.311077 systemd[1]: Reached target local-fs-pre.target. May 14 00:47:50.311969 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 14 00:47:50.312001 systemd[1]: Reached target local-fs.target. May 14 00:47:50.312819 systemd[1]: Reached target machines.target. May 14 00:47:50.314865 systemd[1]: Starting ldconfig.service... May 14 00:47:50.315887 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:47:50.315945 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.316945 systemd[1]: Starting systemd-boot-update.service... May 14 00:47:50.319024 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 14 00:47:50.321430 systemd[1]: Starting systemd-machine-id-commit.service... May 14 00:47:50.324694 systemd[1]: Starting systemd-sysext.service... May 14 00:47:50.325973 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) May 14 00:47:50.327686 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 14 00:47:50.334203 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 14 00:47:50.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.340587 systemd[1]: Unmounting usr-share-oem.mount... May 14 00:47:50.348744 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 14 00:47:50.348938 systemd[1]: Unmounted usr-share-oem.mount. May 14 00:47:50.393800 systemd[1]: Finished systemd-machine-id-commit.service. May 14 00:47:50.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.401175 kernel: loop0: detected capacity change from 0 to 201592 May 14 00:47:50.411982 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) May 14 00:47:50.411982 systemd-fsck[1081]: /dev/vda1: 236 files, 117310/258078 clusters May 14 00:47:50.414132 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 14 00:47:50.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.419319 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 14 00:47:50.448179 kernel: loop1: detected capacity change from 0 to 201592 May 14 00:47:50.452624 (sd-sysext)[1086]: Using extensions 'kubernetes'. May 14 00:47:50.453391 (sd-sysext)[1086]: Merged extensions into '/usr'. May 14 00:47:50.473422 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:47:50.475196 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:47:50.477351 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:47:50.479460 systemd[1]: Starting modprobe@loop.service... May 14 00:47:50.480177 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:47:50.480350 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.481375 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:47:50.481553 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:47:50.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.482733 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:47:50.482916 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:47:50.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.484121 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:47:50.484323 systemd[1]: Finished modprobe@loop.service. May 14 00:47:50.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.485517 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:47:50.485641 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:47:50.496898 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 14 00:47:50.499950 systemd[1]: Finished ldconfig.service. May 14 00:47:50.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.685291 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 14 00:47:50.687084 systemd[1]: Mounting boot.mount... May 14 00:47:50.688795 systemd[1]: Mounting usr-share-oem.mount... May 14 00:47:50.694619 systemd[1]: Mounted boot.mount. May 14 00:47:50.695393 systemd[1]: Mounted usr-share-oem.mount. May 14 00:47:50.697128 systemd[1]: Finished systemd-sysext.service. May 14 00:47:50.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.699046 systemd[1]: Starting ensure-sysext.service... May 14 00:47:50.700885 systemd[1]: Starting systemd-tmpfiles-setup.service... May 14 00:47:50.704222 systemd[1]: Finished systemd-boot-update.service. May 14 00:47:50.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.706458 systemd[1]: Reloading. May 14 00:47:50.709361 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 14 00:47:50.710043 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 14 00:47:50.711307 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 14 00:47:50.758216 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-05-14T00:47:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:47:50.758518 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-05-14T00:47:50Z" level=info msg="torcx already run" May 14 00:47:50.809232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:47:50.809251 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:47:50.824548 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:47:50.865000 audit: BPF prog-id=30 op=LOAD May 14 00:47:50.865000 audit: BPF prog-id=26 op=UNLOAD May 14 00:47:50.866000 audit: BPF prog-id=31 op=LOAD May 14 00:47:50.866000 audit: BPF prog-id=21 op=UNLOAD May 14 00:47:50.866000 audit: BPF prog-id=32 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=33 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=22 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=23 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=34 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=27 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=35 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=36 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=28 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=29 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=37 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=38 op=LOAD May 14 00:47:50.867000 audit: BPF prog-id=24 op=UNLOAD May 14 00:47:50.867000 audit: BPF prog-id=25 op=UNLOAD May 14 00:47:50.871124 systemd[1]: Finished systemd-tmpfiles-setup.service. May 14 00:47:50.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.875104 systemd[1]: Starting audit-rules.service... May 14 00:47:50.876831 systemd[1]: Starting clean-ca-certificates.service... May 14 00:47:50.878951 systemd[1]: Starting systemd-journal-catalog-update.service... May 14 00:47:50.883000 audit: BPF prog-id=39 op=LOAD May 14 00:47:50.884524 systemd[1]: Starting systemd-resolved.service... May 14 00:47:50.885000 audit: BPF prog-id=40 op=LOAD May 14 00:47:50.887235 systemd[1]: Starting systemd-timesyncd.service... May 14 00:47:50.890908 systemd[1]: Starting systemd-update-utmp.service... May 14 00:47:50.895688 systemd[1]: Finished systemd-journal-catalog-update.service. May 14 00:47:50.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.896900 systemd[1]: Finished clean-ca-certificates.service. May 14 00:47:50.897000 audit[1164]: SYSTEM_BOOT pid=1164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 14 00:47:50.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.900783 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:47:50.902291 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:47:50.904077 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:47:50.905867 systemd[1]: Starting modprobe@loop.service... May 14 00:47:50.906473 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:47:50.906654 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.908012 systemd[1]: Starting systemd-update-done.service... May 14 00:47:50.908754 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:47:50.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.910211 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:47:50.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.910332 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:47:50.911440 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:47:50.911550 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:47:50.912673 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:47:50.912799 systemd[1]: Finished modprobe@loop.service. May 14 00:47:50.915193 systemd[1]: Finished systemd-update-utmp.service. May 14 00:47:50.916245 systemd[1]: Finished systemd-update-done.service. May 14 00:47:50.918141 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:47:50.920981 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:47:50.923058 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:47:50.925216 systemd[1]: Starting modprobe@loop.service... May 14 00:47:50.925850 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:47:50.926015 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.926146 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:47:50.927060 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:47:50.927310 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:47:50.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.928480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:47:50.928589 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:47:50.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.929843 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:47:50.929955 systemd[1]: Finished modprobe@loop.service. May 14 00:47:50.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:50.933005 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:47:50.935950 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:47:50.937936 systemd[1]: Starting modprobe@drm.service... May 14 00:47:50.940038 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:47:50.941971 systemd[1]: Starting modprobe@loop.service... May 14 00:47:50.942646 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:47:50.942777 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.943965 systemd[1]: Starting systemd-networkd-wait-online.service... May 14 00:47:50.944819 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:47:50.945000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 14 00:47:50.945000 audit[1182]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe319b280 a2=420 a3=0 items=0 ppid=1153 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:50.945000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 14 00:47:50.945787 augenrules[1182]: No rules May 14 00:47:50.945891 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:47:50.946009 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:47:50.947054 systemd[1]: Started systemd-timesyncd.service. May 14 00:47:50.948105 systemd-timesyncd[1163]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 14 00:47:50.948207 systemd-timesyncd[1163]: Initial clock synchronization to Wed 2025-05-14 00:47:51.219104 UTC. May 14 00:47:50.949688 systemd[1]: Finished audit-rules.service. May 14 00:47:50.950854 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:47:50.950978 systemd[1]: Finished modprobe@drm.service. May 14 00:47:50.952208 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:47:50.952322 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:47:50.952729 systemd-resolved[1159]: Positive Trust Anchors: May 14 00:47:50.952738 systemd-resolved[1159]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:47:50.952765 systemd-resolved[1159]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:47:50.953626 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:47:50.953747 systemd[1]: Finished modprobe@loop.service. May 14 00:47:50.955287 systemd[1]: Reached target time-set.target. May 14 00:47:50.956108 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:47:50.956154 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:47:50.956442 systemd[1]: Finished ensure-sysext.service. May 14 00:47:50.962846 systemd-resolved[1159]: Defaulting to hostname 'linux'. May 14 00:47:50.964244 systemd[1]: Started systemd-resolved.service. May 14 00:47:50.964932 systemd[1]: Reached target network.target. May 14 00:47:50.965658 systemd[1]: Reached target nss-lookup.target. May 14 00:47:50.966321 systemd[1]: Reached target sysinit.target. May 14 00:47:50.966966 systemd[1]: Started motdgen.path. May 14 00:47:50.967550 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 14 00:47:50.968565 systemd[1]: Started logrotate.timer. May 14 00:47:50.969246 systemd[1]: Started mdadm.timer. May 14 00:47:50.969782 systemd[1]: Started systemd-tmpfiles-clean.timer. May 14 00:47:50.970492 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 14 00:47:50.970522 systemd[1]: Reached target paths.target. May 14 00:47:50.971097 systemd[1]: Reached target timers.target. May 14 00:47:50.972024 systemd[1]: Listening on dbus.socket. May 14 00:47:50.973626 systemd[1]: Starting docker.socket... May 14 00:47:50.976731 systemd[1]: Listening on sshd.socket. May 14 00:47:50.977508 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.978082 systemd[1]: Listening on docker.socket. May 14 00:47:50.978797 systemd[1]: Reached target sockets.target. May 14 00:47:50.979377 systemd[1]: Reached target basic.target. May 14 00:47:50.979962 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:47:50.979999 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:47:50.981006 systemd[1]: Starting containerd.service... May 14 00:47:50.982735 systemd[1]: Starting dbus.service... May 14 00:47:50.984342 systemd[1]: Starting enable-oem-cloudinit.service... May 14 00:47:50.986200 systemd[1]: Starting extend-filesystems.service... May 14 00:47:50.986913 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 14 00:47:50.988259 systemd[1]: Starting motdgen.service... May 14 00:47:50.990038 systemd[1]: Starting ssh-key-proc-cmdline.service... May 14 00:47:50.992064 systemd[1]: Starting sshd-keygen.service... May 14 00:47:50.997778 jq[1196]: false May 14 00:47:50.998243 systemd[1]: Starting systemd-logind.service... May 14 00:47:50.999699 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:47:50.999783 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 14 00:47:51.000274 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 14 00:47:51.000982 systemd[1]: Starting update-engine.service... May 14 00:47:51.003184 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 14 00:47:51.005929 jq[1210]: true May 14 00:47:51.006110 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 14 00:47:51.006377 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 14 00:47:51.006846 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 14 00:47:51.007002 systemd[1]: Finished ssh-key-proc-cmdline.service. May 14 00:47:51.013254 systemd[1]: motdgen.service: Deactivated successfully. May 14 00:47:51.013419 systemd[1]: Finished motdgen.service. May 14 00:47:51.021427 jq[1216]: true May 14 00:47:51.023375 extend-filesystems[1197]: Found loop1 May 14 00:47:51.023375 extend-filesystems[1197]: Found vda May 14 00:47:51.024783 extend-filesystems[1197]: Found vda1 May 14 00:47:51.024783 extend-filesystems[1197]: Found vda2 May 14 00:47:51.024783 extend-filesystems[1197]: Found vda3 May 14 00:47:51.024783 extend-filesystems[1197]: Found usr May 14 00:47:51.024783 extend-filesystems[1197]: Found vda4 May 14 00:47:51.024783 extend-filesystems[1197]: Found vda6 May 14 00:47:51.024783 extend-filesystems[1197]: Found vda7 May 14 00:47:51.024783 extend-filesystems[1197]: Found vda9 May 14 00:47:51.024783 extend-filesystems[1197]: Checking size of /dev/vda9 May 14 00:47:51.035419 dbus-daemon[1195]: [system] SELinux support is enabled May 14 00:47:51.035590 systemd[1]: Started dbus.service. May 14 00:47:51.038518 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 14 00:47:51.038544 systemd[1]: Reached target system-config.target. May 14 00:47:51.039230 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 14 00:47:51.039246 systemd[1]: Reached target user-config.target. May 14 00:47:51.056734 extend-filesystems[1197]: Resized partition /dev/vda9 May 14 00:47:51.058096 systemd-logind[1201]: Watching system buttons on /dev/input/event0 (Power Button) May 14 00:47:51.061306 systemd-logind[1201]: New seat seat0. May 14 00:47:51.068564 systemd[1]: Started systemd-logind.service. May 14 00:47:51.069390 extend-filesystems[1244]: resize2fs 1.46.5 (30-Dec-2021) May 14 00:47:51.085215 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 14 00:47:51.095358 update_engine[1209]: I0514 00:47:51.095118 1209 main.cc:92] Flatcar Update Engine starting May 14 00:47:51.099261 bash[1234]: Updated "/home/core/.ssh/authorized_keys" May 14 00:47:51.099864 systemd[1]: Started update-engine.service. May 14 00:47:51.100165 update_engine[1209]: I0514 00:47:51.100135 1209 update_check_scheduler.cc:74] Next update check in 11m21s May 14 00:47:51.100941 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 14 00:47:51.111947 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 14 00:47:51.103642 systemd[1]: Started locksmithd.service. May 14 00:47:51.112729 extend-filesystems[1244]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 14 00:47:51.112729 extend-filesystems[1244]: old_desc_blocks = 1, new_desc_blocks = 1 May 14 00:47:51.112729 extend-filesystems[1244]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 14 00:47:51.116179 extend-filesystems[1197]: Resized filesystem in /dev/vda9 May 14 00:47:51.113738 systemd[1]: extend-filesystems.service: Deactivated successfully. May 14 00:47:51.113917 systemd[1]: Finished extend-filesystems.service. May 14 00:47:51.130668 env[1217]: time="2025-05-14T00:47:51.130610767Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 14 00:47:51.147904 env[1217]: time="2025-05-14T00:47:51.147853860Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 14 00:47:51.148119 env[1217]: time="2025-05-14T00:47:51.148012749Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.149356 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 14 00:47:51.149600 env[1217]: time="2025-05-14T00:47:51.149336004Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 14 00:47:51.149600 env[1217]: time="2025-05-14T00:47:51.149364828Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.149600 env[1217]: time="2025-05-14T00:47:51.149574212Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:47:51.149600 env[1217]: time="2025-05-14T00:47:51.149593690Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.149694 env[1217]: time="2025-05-14T00:47:51.149606593Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 14 00:47:51.149694 env[1217]: time="2025-05-14T00:47:51.149616312Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.149694 env[1217]: time="2025-05-14T00:47:51.149687195Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.149921 env[1217]: time="2025-05-14T00:47:51.149893105Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 14 00:47:51.150037 env[1217]: time="2025-05-14T00:47:51.150018412Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:47:51.150073 env[1217]: time="2025-05-14T00:47:51.150037974Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 14 00:47:51.150109 env[1217]: time="2025-05-14T00:47:51.150092894Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 14 00:47:51.150142 env[1217]: time="2025-05-14T00:47:51.150108650Z" level=info msg="metadata content store policy set" policy=shared May 14 00:47:51.197475 env[1217]: time="2025-05-14T00:47:51.197398695Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 14 00:47:51.197475 env[1217]: time="2025-05-14T00:47:51.197438521Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 14 00:47:51.197475 env[1217]: time="2025-05-14T00:47:51.197453740Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 14 00:47:51.197591 env[1217]: time="2025-05-14T00:47:51.197486410Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197591 env[1217]: time="2025-05-14T00:47:51.197504896Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197591 env[1217]: time="2025-05-14T00:47:51.197519495Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197591 env[1217]: time="2025-05-14T00:47:51.197531943Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197924 env[1217]: time="2025-05-14T00:47:51.197905756Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197978 env[1217]: time="2025-05-14T00:47:51.197931314Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197978 env[1217]: time="2025-05-14T00:47:51.197947360Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197978 env[1217]: time="2025-05-14T00:47:51.197959932Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 14 00:47:51.197978 env[1217]: time="2025-05-14T00:47:51.197973786Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 14 00:47:51.198122 env[1217]: time="2025-05-14T00:47:51.198102650Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198379567Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198732537Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198771081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198789236Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198916942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198934890Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198951184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198967148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.198983483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.199001307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199055 env[1217]: time="2025-05-14T00:47:51.199016940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199347 env[1217]: time="2025-05-14T00:47:51.199231245Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199347 env[1217]: time="2025-05-14T00:47:51.199258415Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 14 00:47:51.199458 env[1217]: time="2025-05-14T00:47:51.199402374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199503282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199522098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199534753Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199549765Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199561676Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 14 00:47:51.199596 env[1217]: time="2025-05-14T00:47:51.199579624Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 14 00:47:51.199728 env[1217]: time="2025-05-14T00:47:51.199616720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 14 00:47:51.200010 env[1217]: time="2025-05-14T00:47:51.199807866Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 14 00:47:51.200010 env[1217]: time="2025-05-14T00:47:51.199866839Z" level=info msg="Connect containerd service" May 14 00:47:51.200010 env[1217]: time="2025-05-14T00:47:51.199898931Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 14 00:47:51.202694 env[1217]: time="2025-05-14T00:47:51.200647384Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:47:51.202694 env[1217]: time="2025-05-14T00:47:51.201011479Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 14 00:47:51.202694 env[1217]: time="2025-05-14T00:47:51.201047955Z" level=info msg=serving... address=/run/containerd/containerd.sock May 14 00:47:51.202694 env[1217]: time="2025-05-14T00:47:51.202049959Z" level=info msg="containerd successfully booted in 0.072322s" May 14 00:47:51.201176 systemd[1]: Started containerd.service. May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.202899362Z" level=info msg="Start subscribing containerd event" May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.202968757Z" level=info msg="Start recovering state" May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.203029715Z" level=info msg="Start event monitor" May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.203051261Z" level=info msg="Start snapshots syncer" May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.203061972Z" level=info msg="Start cni network conf syncer for default" May 14 00:47:51.203182 env[1217]: time="2025-05-14T00:47:51.203069664Z" level=info msg="Start streaming server" May 14 00:47:51.921612 systemd-networkd[1047]: eth0: Gained IPv6LL May 14 00:47:51.923408 systemd[1]: Finished systemd-networkd-wait-online.service. May 14 00:47:51.924406 systemd[1]: Reached target network-online.target. May 14 00:47:51.926550 systemd[1]: Starting kubelet.service... May 14 00:47:52.487836 systemd[1]: Started kubelet.service. May 14 00:47:52.908559 kubelet[1259]: E0514 00:47:52.908450 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:47:52.910529 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:47:52.910661 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:47:53.037983 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 14 00:47:53.056216 systemd[1]: Finished sshd-keygen.service. May 14 00:47:53.058424 systemd[1]: Starting issuegen.service... May 14 00:47:53.063026 systemd[1]: issuegen.service: Deactivated successfully. May 14 00:47:53.063177 systemd[1]: Finished issuegen.service. May 14 00:47:53.065242 systemd[1]: Starting systemd-user-sessions.service... May 14 00:47:53.071121 systemd[1]: Finished systemd-user-sessions.service. May 14 00:47:53.073161 systemd[1]: Started getty@tty1.service. May 14 00:47:53.074990 systemd[1]: Started serial-getty@ttyAMA0.service. May 14 00:47:53.075959 systemd[1]: Reached target getty.target. May 14 00:47:53.076651 systemd[1]: Reached target multi-user.target. May 14 00:47:53.078375 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 14 00:47:53.084952 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 14 00:47:53.085100 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 14 00:47:53.085990 systemd[1]: Startup finished in 585ms (kernel) + 4.211s (initrd) + 5.299s (userspace) = 10.095s. May 14 00:47:56.755037 systemd[1]: Created slice system-sshd.slice. May 14 00:47:56.756107 systemd[1]: Started sshd@0-10.0.0.102:22-10.0.0.1:41786.service. May 14 00:47:56.810354 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 41786 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:56.812529 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:56.821909 systemd[1]: Created slice user-500.slice. May 14 00:47:56.822977 systemd[1]: Starting user-runtime-dir@500.service... May 14 00:47:56.825262 systemd-logind[1201]: New session 1 of user core. May 14 00:47:56.830891 systemd[1]: Finished user-runtime-dir@500.service. May 14 00:47:56.834830 systemd[1]: Starting user@500.service... May 14 00:47:56.837780 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:56.912056 systemd[1284]: Queued start job for default target default.target. May 14 00:47:56.912933 systemd[1284]: Reached target paths.target. May 14 00:47:56.913087 systemd[1284]: Reached target sockets.target. May 14 00:47:56.913329 systemd[1284]: Reached target timers.target. May 14 00:47:56.913436 systemd[1284]: Reached target basic.target. May 14 00:47:56.913561 systemd[1284]: Reached target default.target. May 14 00:47:56.913667 systemd[1]: Started user@500.service. May 14 00:47:56.913761 systemd[1284]: Startup finished in 70ms. May 14 00:47:56.914673 systemd[1]: Started session-1.scope. May 14 00:47:56.969935 systemd[1]: Started sshd@1-10.0.0.102:22-10.0.0.1:41802.service. May 14 00:47:57.004543 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 41802 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.005847 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.009739 systemd-logind[1201]: New session 2 of user core. May 14 00:47:57.010898 systemd[1]: Started session-2.scope. May 14 00:47:57.066101 sshd[1293]: pam_unix(sshd:session): session closed for user core May 14 00:47:57.068199 systemd[1]: Started sshd@2-10.0.0.102:22-10.0.0.1:41814.service. May 14 00:47:57.068676 systemd[1]: sshd@1-10.0.0.102:22-10.0.0.1:41802.service: Deactivated successfully. May 14 00:47:57.069506 systemd-logind[1201]: Session 2 logged out. Waiting for processes to exit. May 14 00:47:57.069562 systemd[1]: session-2.scope: Deactivated successfully. May 14 00:47:57.070367 systemd-logind[1201]: Removed session 2. May 14 00:47:57.103249 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 41814 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.104432 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.107776 systemd-logind[1201]: New session 3 of user core. May 14 00:47:57.108558 systemd[1]: Started session-3.scope. May 14 00:47:57.158547 sshd[1298]: pam_unix(sshd:session): session closed for user core May 14 00:47:57.162287 systemd[1]: Started sshd@3-10.0.0.102:22-10.0.0.1:41818.service. May 14 00:47:57.162786 systemd[1]: sshd@2-10.0.0.102:22-10.0.0.1:41814.service: Deactivated successfully. May 14 00:47:57.163399 systemd[1]: session-3.scope: Deactivated successfully. May 14 00:47:57.163858 systemd-logind[1201]: Session 3 logged out. Waiting for processes to exit. May 14 00:47:57.164694 systemd-logind[1201]: Removed session 3. May 14 00:47:57.197305 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 41818 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.198543 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.202233 systemd-logind[1201]: New session 4 of user core. May 14 00:47:57.202760 systemd[1]: Started session-4.scope. May 14 00:47:57.256358 sshd[1304]: pam_unix(sshd:session): session closed for user core May 14 00:47:57.259214 systemd[1]: sshd@3-10.0.0.102:22-10.0.0.1:41818.service: Deactivated successfully. May 14 00:47:57.259914 systemd[1]: session-4.scope: Deactivated successfully. May 14 00:47:57.260477 systemd-logind[1201]: Session 4 logged out. Waiting for processes to exit. May 14 00:47:57.261658 systemd[1]: Started sshd@4-10.0.0.102:22-10.0.0.1:41826.service. May 14 00:47:57.262295 systemd-logind[1201]: Removed session 4. May 14 00:47:57.297370 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 41826 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.298986 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.302582 systemd-logind[1201]: New session 5 of user core. May 14 00:47:57.303356 systemd[1]: Started session-5.scope. May 14 00:47:57.368473 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 14 00:47:57.369011 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:57.379339 dbus-daemon[1195]: avc: received setenforce notice (enforcing=1) May 14 00:47:57.380266 sudo[1314]: pam_unix(sudo:session): session closed for user root May 14 00:47:57.382883 sshd[1311]: pam_unix(sshd:session): session closed for user core May 14 00:47:57.386279 systemd[1]: Started sshd@5-10.0.0.102:22-10.0.0.1:41836.service. May 14 00:47:57.386806 systemd[1]: sshd@4-10.0.0.102:22-10.0.0.1:41826.service: Deactivated successfully. May 14 00:47:57.387420 systemd[1]: session-5.scope: Deactivated successfully. May 14 00:47:57.387954 systemd-logind[1201]: Session 5 logged out. Waiting for processes to exit. May 14 00:47:57.388762 systemd-logind[1201]: Removed session 5. May 14 00:47:57.421190 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 41836 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.422557 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.425776 systemd-logind[1201]: New session 6 of user core. May 14 00:47:57.426613 systemd[1]: Started session-6.scope. May 14 00:47:57.480437 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 14 00:47:57.480693 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:57.483264 sudo[1322]: pam_unix(sudo:session): session closed for user root May 14 00:47:57.487637 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 14 00:47:57.488101 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:57.496385 systemd[1]: Stopping audit-rules.service... May 14 00:47:57.497000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:47:57.497911 auditctl[1325]: No rules May 14 00:47:57.498417 systemd[1]: audit-rules.service: Deactivated successfully. May 14 00:47:57.498571 systemd[1]: Stopped audit-rules.service. May 14 00:47:57.499420 kernel: kauditd_printk_skb: 118 callbacks suppressed May 14 00:47:57.499462 kernel: audit: type=1305 audit(1747183677.497:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:47:57.499529 kernel: audit: type=1300 audit(1747183677.497:208): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa0e8600 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:57.497000 audit[1325]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa0e8600 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:57.499880 systemd[1]: Starting audit-rules.service... May 14 00:47:57.502141 kernel: audit: type=1327 audit(1747183677.497:208): proctitle=2F7362696E2F617564697463746C002D44 May 14 00:47:57.497000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 14 00:47:57.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.506220 kernel: audit: type=1131 audit(1747183677.498:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.515947 augenrules[1342]: No rules May 14 00:47:57.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.516643 systemd[1]: Finished audit-rules.service. May 14 00:47:57.517583 sudo[1321]: pam_unix(sudo:session): session closed for user root May 14 00:47:57.516000 audit[1321]: USER_END pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.519375 sshd[1317]: pam_unix(sshd:session): session closed for user core May 14 00:47:57.522926 kernel: audit: type=1130 audit(1747183677.515:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.523132 kernel: audit: type=1106 audit(1747183677.516:211): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.523165 kernel: audit: type=1104 audit(1747183677.516:212): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.516000 audit[1321]: CRED_DISP pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.522350 systemd[1]: Started sshd@6-10.0.0.102:22-10.0.0.1:41846.service. May 14 00:47:57.522792 systemd[1]: sshd@5-10.0.0.102:22-10.0.0.1:41836.service: Deactivated successfully. May 14 00:47:57.523567 systemd[1]: session-6.scope: Deactivated successfully. May 14 00:47:57.523721 kernel: audit: type=1106 audit(1747183677.519:213): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.519000 audit[1317]: USER_END pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.524104 systemd-logind[1201]: Session 6 logged out. Waiting for processes to exit. May 14 00:47:57.525189 systemd-logind[1201]: Removed session 6. May 14 00:47:57.526300 kernel: audit: type=1104 audit(1747183677.519:214): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.519000 audit[1317]: CRED_DISP pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.528343 kernel: audit: type=1130 audit(1747183677.521:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.102:22-10.0.0.1:41846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.102:22-10.0.0.1:41846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.102:22-10.0.0.1:41836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.559000 audit[1347]: USER_ACCT pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.559526 sshd[1347]: Accepted publickey for core from 10.0.0.1 port 41846 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:47:57.560000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.560000 audit[1347]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd34abe0 a2=3 a3=1 items=0 ppid=1 pid=1347 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:57.560000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:47:57.560991 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:47:57.564200 systemd-logind[1201]: New session 7 of user core. May 14 00:47:57.564975 systemd[1]: Started session-7.scope. May 14 00:47:57.567000 audit[1347]: USER_START pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.568000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:47:57.617145 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 14 00:47:57.615000 audit[1351]: USER_ACCT pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.616000 audit[1351]: CRED_REFR pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.617827 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:47:57.618000 audit[1351]: USER_START pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:47:57.629820 systemd[1]: Starting coreos-metadata.service... May 14 00:47:57.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:57.636096 systemd[1]: coreos-metadata.service: Deactivated successfully. May 14 00:47:57.636266 systemd[1]: Finished coreos-metadata.service. May 14 00:47:58.098495 systemd[1]: Stopped kubelet.service. May 14 00:47:58.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:58.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:58.100669 systemd[1]: Starting kubelet.service... May 14 00:47:58.121935 systemd[1]: Reloading. May 14 00:47:58.178932 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-05-14T00:47:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:47:58.178962 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-05-14T00:47:58Z" level=info msg="torcx already run" May 14 00:47:58.327552 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:47:58.327698 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:47:58.343365 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:47:58.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.390000 audit: BPF prog-id=46 op=LOAD May 14 00:47:58.390000 audit: BPF prog-id=30 op=UNLOAD May 14 00:47:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.391000 audit: BPF prog-id=47 op=LOAD May 14 00:47:58.391000 audit: BPF prog-id=44 op=UNLOAD May 14 00:47:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.392000 audit: BPF prog-id=48 op=LOAD May 14 00:47:58.392000 audit: BPF prog-id=39 op=UNLOAD May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit: BPF prog-id=49 op=LOAD May 14 00:47:58.394000 audit: BPF prog-id=31 op=UNLOAD May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit: BPF prog-id=50 op=LOAD May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.395000 audit: BPF prog-id=51 op=LOAD May 14 00:47:58.395000 audit: BPF prog-id=32 op=UNLOAD May 14 00:47:58.395000 audit: BPF prog-id=33 op=UNLOAD May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit: BPF prog-id=52 op=LOAD May 14 00:47:58.396000 audit: BPF prog-id=34 op=UNLOAD May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit: BPF prog-id=53 op=LOAD May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.397000 audit: BPF prog-id=54 op=LOAD May 14 00:47:58.397000 audit: BPF prog-id=35 op=UNLOAD May 14 00:47:58.397000 audit: BPF prog-id=36 op=UNLOAD May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit: BPF prog-id=55 op=LOAD May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.399000 audit: BPF prog-id=56 op=LOAD May 14 00:47:58.399000 audit: BPF prog-id=37 op=UNLOAD May 14 00:47:58.399000 audit: BPF prog-id=38 op=UNLOAD May 14 00:47:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.400000 audit: BPF prog-id=57 op=LOAD May 14 00:47:58.400000 audit: BPF prog-id=41 op=UNLOAD May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit: BPF prog-id=58 op=LOAD May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.401000 audit: BPF prog-id=59 op=LOAD May 14 00:47:58.401000 audit: BPF prog-id=42 op=UNLOAD May 14 00:47:58.402000 audit: BPF prog-id=43 op=UNLOAD May 14 00:47:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:58.405000 audit: BPF prog-id=60 op=LOAD May 14 00:47:58.405000 audit: BPF prog-id=40 op=UNLOAD May 14 00:47:58.415609 systemd[1]: Started kubelet.service. May 14 00:47:58.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:58.417413 systemd[1]: Stopping kubelet.service... May 14 00:47:58.417937 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:47:58.418262 systemd[1]: Stopped kubelet.service. May 14 00:47:58.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:58.420347 systemd[1]: Starting kubelet.service... May 14 00:47:58.514456 systemd[1]: Started kubelet.service. May 14 00:47:58.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:47:58.550878 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:58.550878 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 14 00:47:58.550878 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:47:58.551240 kubelet[1454]: I0514 00:47:58.550930 1454 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:47:59.295451 kubelet[1454]: I0514 00:47:59.295413 1454 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 14 00:47:59.295608 kubelet[1454]: I0514 00:47:59.295597 1454 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:47:59.295927 kubelet[1454]: I0514 00:47:59.295907 1454 server.go:954] "Client rotation is on, will bootstrap in background" May 14 00:47:59.393568 kubelet[1454]: I0514 00:47:59.393516 1454 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:47:59.402630 kubelet[1454]: E0514 00:47:59.402587 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 14 00:47:59.402630 kubelet[1454]: I0514 00:47:59.402621 1454 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 14 00:47:59.405534 kubelet[1454]: I0514 00:47:59.405507 1454 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:47:59.406325 kubelet[1454]: I0514 00:47:59.406261 1454 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:47:59.406502 kubelet[1454]: I0514 00:47:59.406325 1454 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.102","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 14 00:47:59.406588 kubelet[1454]: I0514 00:47:59.406576 1454 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:47:59.406588 kubelet[1454]: I0514 00:47:59.406588 1454 container_manager_linux.go:304] "Creating device plugin manager" May 14 00:47:59.406794 kubelet[1454]: I0514 00:47:59.406781 1454 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:59.414951 kubelet[1454]: I0514 00:47:59.414923 1454 kubelet.go:446] "Attempting to sync node with API server" May 14 00:47:59.414951 kubelet[1454]: I0514 00:47:59.414948 1454 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:47:59.415058 kubelet[1454]: I0514 00:47:59.414972 1454 kubelet.go:352] "Adding apiserver pod source" May 14 00:47:59.415058 kubelet[1454]: I0514 00:47:59.414987 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:47:59.415117 kubelet[1454]: E0514 00:47:59.415077 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:47:59.415142 kubelet[1454]: E0514 00:47:59.415120 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:47:59.420212 kubelet[1454]: I0514 00:47:59.420185 1454 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:47:59.422863 kubelet[1454]: I0514 00:47:59.422847 1454 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:47:59.422991 kubelet[1454]: W0514 00:47:59.422977 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 14 00:47:59.424081 kubelet[1454]: W0514 00:47:59.424057 1454 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.102" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 14 00:47:59.424135 kubelet[1454]: E0514 00:47:59.424107 1454 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.102\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 14 00:47:59.424333 kubelet[1454]: W0514 00:47:59.424313 1454 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 14 00:47:59.424369 kubelet[1454]: E0514 00:47:59.424345 1454 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 14 00:47:59.426197 kubelet[1454]: I0514 00:47:59.426173 1454 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 14 00:47:59.426235 kubelet[1454]: I0514 00:47:59.426215 1454 server.go:1287] "Started kubelet" May 14 00:47:59.426387 kubelet[1454]: I0514 00:47:59.426356 1454 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:47:59.427860 kubelet[1454]: I0514 00:47:59.427831 1454 server.go:490] "Adding debug handlers to kubelet server" May 14 00:47:59.439556 kubelet[1454]: I0514 00:47:59.439359 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:47:59.440630 kubelet[1454]: E0514 00:47:59.440606 1454 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:47:59.440771 kubelet[1454]: I0514 00:47:59.440755 1454 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:47:59.439000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:59.439000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:59.439000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a50b10 a1=4000a6a558 a2=4000a50ae0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:59.440000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:59.440000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:59.440000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d90100 a1=4000a6a570 a2=4000a50ba0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.440000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:59.441487 kubelet[1454]: I0514 00:47:59.441259 1454 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:47:59.441487 kubelet[1454]: I0514 00:47:59.441311 1454 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 14 00:47:59.441487 kubelet[1454]: I0514 00:47:59.441390 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:47:59.441761 kubelet[1454]: I0514 00:47:59.441636 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 14 00:47:59.442614 kubelet[1454]: E0514 00:47:59.442587 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:47:59.442664 kubelet[1454]: I0514 00:47:59.442620 1454 volume_manager.go:297] "Starting Kubelet Volume Manager" May 14 00:47:59.442796 kubelet[1454]: I0514 00:47:59.442774 1454 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 14 00:47:59.442865 kubelet[1454]: I0514 00:47:59.442850 1454 reconciler.go:26] "Reconciler: start to sync state" May 14 00:47:59.443314 kubelet[1454]: I0514 00:47:59.443286 1454 factory.go:221] Registration of the systemd container factory successfully May 14 00:47:59.443441 kubelet[1454]: I0514 00:47:59.443389 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:47:59.444750 kubelet[1454]: I0514 00:47:59.444726 1454 factory.go:221] Registration of the containerd container factory successfully May 14 00:47:59.448595 kubelet[1454]: E0514 00:47:59.448553 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.102\" not found" node="10.0.0.102" May 14 00:47:59.454982 kubelet[1454]: I0514 00:47:59.454950 1454 cpu_manager.go:221] "Starting CPU manager" policy="none" May 14 00:47:59.454982 kubelet[1454]: I0514 00:47:59.454968 1454 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 14 00:47:59.455089 kubelet[1454]: I0514 00:47:59.454987 1454 state_mem.go:36] "Initialized new in-memory state store" May 14 00:47:59.529305 kubelet[1454]: I0514 00:47:59.529221 1454 policy_none.go:49] "None policy: Start" May 14 00:47:59.529305 kubelet[1454]: I0514 00:47:59.529252 1454 memory_manager.go:186] "Starting memorymanager" policy="None" May 14 00:47:59.529305 kubelet[1454]: I0514 00:47:59.529264 1454 state_mem.go:35] "Initializing new in-memory state store" May 14 00:47:59.536107 systemd[1]: Created slice kubepods.slice. May 14 00:47:59.540319 systemd[1]: Created slice kubepods-burstable.slice. May 14 00:47:59.542677 kubelet[1454]: E0514 00:47:59.542639 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:47:59.542984 systemd[1]: Created slice kubepods-besteffort.slice. May 14 00:47:59.550000 audit[1473]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.550000 audit[1473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc88e96f0 a2=0 a3=1 items=0 ppid=1454 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:47:59.553767 kubelet[1454]: I0514 00:47:59.553731 1454 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:47:59.552000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:47:59.552000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:47:59.552000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a512f0 a1=4000a6abd0 a2=4000a512c0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.552000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:47:59.554125 kubelet[1454]: I0514 00:47:59.553816 1454 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:47:59.554125 kubelet[1454]: I0514 00:47:59.553929 1454 eviction_manager.go:189] "Eviction manager: starting control loop" May 14 00:47:59.554125 kubelet[1454]: I0514 00:47:59.553941 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:47:59.554408 kubelet[1454]: I0514 00:47:59.554386 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:47:59.555194 kubelet[1454]: E0514 00:47:59.555157 1454 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 14 00:47:59.555268 kubelet[1454]: E0514 00:47:59.555204 1454 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.102\" not found" May 14 00:47:59.555000 audit[1475]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.555000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc7b877c0 a2=0 a3=1 items=0 ppid=1454 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:47:59.557000 audit[1477]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.557000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc66a29b0 a2=0 a3=1 items=0 ppid=1454 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:59.593000 audit[1482]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.593000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff2e5cd30 a2=0 a3=1 items=0 ppid=1454 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:47:59.630000 audit[1487]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.630000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdb225a00 a2=0 a3=1 items=0 ppid=1454 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 14 00:47:59.631101 kubelet[1454]: I0514 00:47:59.631046 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:47:59.631000 audit[1488]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:59.631000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1d3d430 a2=0 a3=1 items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:47:59.632113 kubelet[1454]: I0514 00:47:59.632092 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:47:59.632206 kubelet[1454]: I0514 00:47:59.632195 1454 status_manager.go:227] "Starting to sync pod status with apiserver" May 14 00:47:59.632287 kubelet[1454]: I0514 00:47:59.632273 1454 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 14 00:47:59.632337 kubelet[1454]: I0514 00:47:59.632328 1454 kubelet.go:2388] "Starting kubelet main sync loop" May 14 00:47:59.632513 kubelet[1454]: E0514 00:47:59.632498 1454 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 14 00:47:59.632000 audit[1489]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.632000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc30d580 a2=0 a3=1 items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:47:59.634000 audit[1491]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.634000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd66e16c0 a2=0 a3=1 items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:47:59.634000 audit[1490]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:59.634000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff95b7d30 a2=0 a3=1 items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:47:59.635000 audit[1493]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:47:59.635000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc69f7be0 a2=0 a3=1 items=0 ppid=1454 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.635000 audit[1492]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:59.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:47:59.635000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff0e919d0 a2=0 a3=1 items=0 ppid=1454 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:47:59.636000 audit[1494]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:47:59.636000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdebd6f80 a2=0 a3=1 items=0 ppid=1454 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:47:59.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:47:59.655480 kubelet[1454]: I0514 00:47:59.655448 1454 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.102" May 14 00:47:59.666452 kubelet[1454]: I0514 00:47:59.666408 1454 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.102" May 14 00:47:59.666452 kubelet[1454]: E0514 00:47:59.666449 1454 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.0.0.102\": node \"10.0.0.102\" not found" May 14 00:47:59.670082 kubelet[1454]: E0514 00:47:59.670050 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:47:59.770389 kubelet[1454]: E0514 00:47:59.770349 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:47:59.870820 kubelet[1454]: E0514 00:47:59.870721 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:47:59.971782 kubelet[1454]: E0514 00:47:59.971724 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:48:00.044000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:48:00.044000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:48:00.045585 sudo[1351]: pam_unix(sudo:session): session closed for user root May 14 00:48:00.047126 sshd[1347]: pam_unix(sshd:session): session closed for user core May 14 00:48:00.046000 audit[1347]: USER_END pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.046000 audit[1347]: CRED_DISP pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:48:00.049418 systemd[1]: sshd@6-10.0.0.102:22-10.0.0.1:41846.service: Deactivated successfully. May 14 00:48:00.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.102:22-10.0.0.1:41846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:48:00.050153 systemd[1]: session-7.scope: Deactivated successfully. May 14 00:48:00.050721 systemd-logind[1201]: Session 7 logged out. Waiting for processes to exit. May 14 00:48:00.051395 systemd-logind[1201]: Removed session 7. May 14 00:48:00.072384 kubelet[1454]: E0514 00:48:00.072328 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:48:00.173421 kubelet[1454]: E0514 00:48:00.173324 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:48:00.274304 kubelet[1454]: E0514 00:48:00.274259 1454 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.102\" not found" May 14 00:48:00.297684 kubelet[1454]: I0514 00:48:00.297635 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 14 00:48:00.297837 kubelet[1454]: W0514 00:48:00.297813 1454 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 14 00:48:00.297874 kubelet[1454]: W0514 00:48:00.297851 1454 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 14 00:48:00.375303 kubelet[1454]: I0514 00:48:00.375263 1454 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 14 00:48:00.375620 env[1217]: time="2025-05-14T00:48:00.375570357Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 14 00:48:00.376019 kubelet[1454]: I0514 00:48:00.375997 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 14 00:48:00.416193 kubelet[1454]: I0514 00:48:00.416140 1454 apiserver.go:52] "Watching apiserver" May 14 00:48:00.416401 kubelet[1454]: E0514 00:48:00.416382 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:00.421785 kubelet[1454]: E0514 00:48:00.421748 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:00.426434 systemd[1]: Created slice kubepods-besteffort-pod118b70ef_9d27_4fa2_875a_fa0128ecdc2c.slice. May 14 00:48:00.439094 systemd[1]: Created slice kubepods-besteffort-pod1d8ebd55_c963_455a_b911_c3d19b7f78db.slice. May 14 00:48:00.443192 kubelet[1454]: I0514 00:48:00.443150 1454 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 14 00:48:00.449514 kubelet[1454]: I0514 00:48:00.449154 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-lib-calico\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449514 kubelet[1454]: I0514 00:48:00.449207 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-bin-dir\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449514 kubelet[1454]: I0514 00:48:00.449228 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8996e0dd-449a-4bca-bc28-75021d9f9084-kubelet-dir\") pod \"csi-node-driver-bl8sx\" (UID: \"8996e0dd-449a-4bca-bc28-75021d9f9084\") " pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:00.449514 kubelet[1454]: I0514 00:48:00.449245 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8996e0dd-449a-4bca-bc28-75021d9f9084-registration-dir\") pod \"csi-node-driver-bl8sx\" (UID: \"8996e0dd-449a-4bca-bc28-75021d9f9084\") " pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:00.449514 kubelet[1454]: I0514 00:48:00.449266 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-net-dir\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449738 kubelet[1454]: I0514 00:48:00.449283 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-log-dir\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449738 kubelet[1454]: I0514 00:48:00.449297 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rpv9x\" (UniqueName: \"kubernetes.io/projected/1d8ebd55-c963-455a-b911-c3d19b7f78db-kube-api-access-rpv9x\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449738 kubelet[1454]: I0514 00:48:00.449316 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/118b70ef-9d27-4fa2-875a-fa0128ecdc2c-kube-proxy\") pod \"kube-proxy-hbsjc\" (UID: \"118b70ef-9d27-4fa2-875a-fa0128ecdc2c\") " pod="kube-system/kube-proxy-hbsjc" May 14 00:48:00.449738 kubelet[1454]: I0514 00:48:00.449356 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/118b70ef-9d27-4fa2-875a-fa0128ecdc2c-lib-modules\") pod \"kube-proxy-hbsjc\" (UID: \"118b70ef-9d27-4fa2-875a-fa0128ecdc2c\") " pod="kube-system/kube-proxy-hbsjc" May 14 00:48:00.449738 kubelet[1454]: I0514 00:48:00.449422 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-xtables-lock\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449839 kubelet[1454]: I0514 00:48:00.449457 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-policysync\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449839 kubelet[1454]: I0514 00:48:00.449480 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-run-calico\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449839 kubelet[1454]: I0514 00:48:00.449512 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/118b70ef-9d27-4fa2-875a-fa0128ecdc2c-xtables-lock\") pod \"kube-proxy-hbsjc\" (UID: \"118b70ef-9d27-4fa2-875a-fa0128ecdc2c\") " pod="kube-system/kube-proxy-hbsjc" May 14 00:48:00.449839 kubelet[1454]: I0514 00:48:00.449536 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1d8ebd55-c963-455a-b911-c3d19b7f78db-node-certs\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449839 kubelet[1454]: I0514 00:48:00.449553 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8996e0dd-449a-4bca-bc28-75021d9f9084-socket-dir\") pod \"csi-node-driver-bl8sx\" (UID: \"8996e0dd-449a-4bca-bc28-75021d9f9084\") " pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:00.449936 kubelet[1454]: I0514 00:48:00.449598 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6fzh\" (UniqueName: \"kubernetes.io/projected/8996e0dd-449a-4bca-bc28-75021d9f9084-kube-api-access-q6fzh\") pod \"csi-node-driver-bl8sx\" (UID: \"8996e0dd-449a-4bca-bc28-75021d9f9084\") " pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:00.449936 kubelet[1454]: I0514 00:48:00.449624 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wd9ht\" (UniqueName: \"kubernetes.io/projected/118b70ef-9d27-4fa2-875a-fa0128ecdc2c-kube-api-access-wd9ht\") pod \"kube-proxy-hbsjc\" (UID: \"118b70ef-9d27-4fa2-875a-fa0128ecdc2c\") " pod="kube-system/kube-proxy-hbsjc" May 14 00:48:00.449936 kubelet[1454]: I0514 00:48:00.449648 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-lib-modules\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449936 kubelet[1454]: I0514 00:48:00.449673 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1d8ebd55-c963-455a-b911-c3d19b7f78db-tigera-ca-bundle\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.449936 kubelet[1454]: I0514 00:48:00.449696 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-flexvol-driver-host\") pod \"calico-node-4gvkl\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " pod="calico-system/calico-node-4gvkl" May 14 00:48:00.450034 kubelet[1454]: I0514 00:48:00.449727 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8996e0dd-449a-4bca-bc28-75021d9f9084-varrun\") pod \"csi-node-driver-bl8sx\" (UID: \"8996e0dd-449a-4bca-bc28-75021d9f9084\") " pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:00.551466 kubelet[1454]: E0514 00:48:00.551429 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.551466 kubelet[1454]: W0514 00:48:00.551450 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.551466 kubelet[1454]: E0514 00:48:00.551467 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.551698 kubelet[1454]: E0514 00:48:00.551683 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.551698 kubelet[1454]: W0514 00:48:00.551698 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.551757 kubelet[1454]: E0514 00:48:00.551708 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.551820 kubelet[1454]: I0514 00:48:00.551805 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 14 00:48:00.557790 kubelet[1454]: E0514 00:48:00.557753 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.557790 kubelet[1454]: W0514 00:48:00.557772 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.557790 kubelet[1454]: E0514 00:48:00.557787 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.566381 kubelet[1454]: E0514 00:48:00.566148 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.566381 kubelet[1454]: W0514 00:48:00.566184 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.566381 kubelet[1454]: E0514 00:48:00.566207 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.566522 kubelet[1454]: E0514 00:48:00.566407 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.566522 kubelet[1454]: W0514 00:48:00.566421 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.566522 kubelet[1454]: E0514 00:48:00.566434 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.569595 kubelet[1454]: E0514 00:48:00.569576 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:00.569686 kubelet[1454]: W0514 00:48:00.569672 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:00.569760 kubelet[1454]: E0514 00:48:00.569748 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:00.737437 kubelet[1454]: E0514 00:48:00.737334 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:00.738527 env[1217]: time="2025-05-14T00:48:00.738470756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hbsjc,Uid:118b70ef-9d27-4fa2-875a-fa0128ecdc2c,Namespace:kube-system,Attempt:0,}" May 14 00:48:00.742009 kubelet[1454]: E0514 00:48:00.741986 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:00.742800 env[1217]: time="2025-05-14T00:48:00.742372794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4gvkl,Uid:1d8ebd55-c963-455a-b911-c3d19b7f78db,Namespace:calico-system,Attempt:0,}" May 14 00:48:01.312007 env[1217]: time="2025-05-14T00:48:01.311957575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.313656 env[1217]: time="2025-05-14T00:48:01.313629631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.314678 env[1217]: time="2025-05-14T00:48:01.314641614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.316270 env[1217]: time="2025-05-14T00:48:01.316244861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.317884 env[1217]: time="2025-05-14T00:48:01.317857512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.320291 env[1217]: time="2025-05-14T00:48:01.320264623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.322752 env[1217]: time="2025-05-14T00:48:01.322724965Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.323592 env[1217]: time="2025-05-14T00:48:01.323567490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:01.354908 env[1217]: time="2025-05-14T00:48:01.354831001Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:01.354908 env[1217]: time="2025-05-14T00:48:01.354870308Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:01.354908 env[1217]: time="2025-05-14T00:48:01.354886370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:01.355222 env[1217]: time="2025-05-14T00:48:01.355180570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e4a6746991848ce5e6dad0ba1d4714458512ac984506c899c7bcf5e6de9a85f pid=1529 runtime=io.containerd.runc.v2 May 14 00:48:01.355331 env[1217]: time="2025-05-14T00:48:01.355284085Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:01.355379 env[1217]: time="2025-05-14T00:48:01.355347203Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:01.355404 env[1217]: time="2025-05-14T00:48:01.355375614Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:01.355552 env[1217]: time="2025-05-14T00:48:01.355517306Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc pid=1528 runtime=io.containerd.runc.v2 May 14 00:48:01.372270 systemd[1]: Started cri-containerd-5e4a6746991848ce5e6dad0ba1d4714458512ac984506c899c7bcf5e6de9a85f.scope. May 14 00:48:01.376413 systemd[1]: Started cri-containerd-be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc.scope. May 14 00:48:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.399000 audit: BPF prog-id=61 op=LOAD May 14 00:48:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.400000 audit: BPF prog-id=62 op=LOAD May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265356639373333386337383535323634363164623162363835316436 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265356639373333386337383535323634363164623162363835316436 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit: BPF prog-id=63 op=LOAD May 14 00:48:01.401000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265356639373333386337383535323634363164623162363835316436 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit: BPF prog-id=64 op=LOAD May 14 00:48:01.401000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265356639373333386337383535323634363164623162363835316436 May 14 00:48:01.401000 audit: BPF prog-id=64 op=UNLOAD May 14 00:48:01.401000 audit: BPF prog-id=63 op=UNLOAD May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit: BPF prog-id=65 op=LOAD May 14 00:48:01.401000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265356639373333386337383535323634363164623162363835316436 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1529 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346136373436393931383438636535653664616430626131643437 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1529 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346136373436393931383438636535653664616430626131643437 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit: BPF prog-id=66 op=LOAD May 14 00:48:01.401000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1529 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346136373436393931383438636535653664616430626131643437 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.401000 audit: BPF prog-id=67 op=LOAD May 14 00:48:01.401000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1529 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346136373436393931383438636535653664616430626131643437 May 14 00:48:01.401000 audit: BPF prog-id=67 op=UNLOAD May 14 00:48:01.401000 audit: BPF prog-id=66 op=UNLOAD May 14 00:48:01.403000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:01.403000 audit: BPF prog-id=68 op=LOAD May 14 00:48:01.403000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1529 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:01.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346136373436393931383438636535653664616430626131643437 May 14 00:48:01.414254 env[1217]: time="2025-05-14T00:48:01.414210932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hbsjc,Uid:118b70ef-9d27-4fa2-875a-fa0128ecdc2c,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e4a6746991848ce5e6dad0ba1d4714458512ac984506c899c7bcf5e6de9a85f\"" May 14 00:48:01.415249 kubelet[1454]: E0514 00:48:01.415226 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:01.416556 kubelet[1454]: E0514 00:48:01.416533 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:01.417159 env[1217]: time="2025-05-14T00:48:01.417039891Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 14 00:48:01.422497 env[1217]: time="2025-05-14T00:48:01.422461440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4gvkl,Uid:1d8ebd55-c963-455a-b911-c3d19b7f78db,Namespace:calico-system,Attempt:0,} returns sandbox id \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\"" May 14 00:48:01.423176 kubelet[1454]: E0514 00:48:01.423135 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:01.557849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3993953122.mount: Deactivated successfully. May 14 00:48:02.417444 kubelet[1454]: E0514 00:48:02.417403 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:02.440668 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3940688374.mount: Deactivated successfully. May 14 00:48:02.633387 kubelet[1454]: E0514 00:48:02.633341 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:02.907566 env[1217]: time="2025-05-14T00:48:02.907442272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:02.908875 env[1217]: time="2025-05-14T00:48:02.908835537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:02.910227 env[1217]: time="2025-05-14T00:48:02.910199979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:02.911821 env[1217]: time="2025-05-14T00:48:02.911792265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:02.912291 env[1217]: time="2025-05-14T00:48:02.912263392Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 14 00:48:02.915843 env[1217]: time="2025-05-14T00:48:02.915793356Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 14 00:48:02.917215 env[1217]: time="2025-05-14T00:48:02.916908428Z" level=info msg="CreateContainer within sandbox \"5e4a6746991848ce5e6dad0ba1d4714458512ac984506c899c7bcf5e6de9a85f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 14 00:48:02.935455 env[1217]: time="2025-05-14T00:48:02.935407545Z" level=info msg="CreateContainer within sandbox \"5e4a6746991848ce5e6dad0ba1d4714458512ac984506c899c7bcf5e6de9a85f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0e1b2cd060b7e0c47711e5fd030f6258b6202fc7c8f15dd7b6d3570b0e91ad3a\"" May 14 00:48:02.936292 env[1217]: time="2025-05-14T00:48:02.936263612Z" level=info msg="StartContainer for \"0e1b2cd060b7e0c47711e5fd030f6258b6202fc7c8f15dd7b6d3570b0e91ad3a\"" May 14 00:48:02.953039 systemd[1]: Started cri-containerd-0e1b2cd060b7e0c47711e5fd030f6258b6202fc7c8f15dd7b6d3570b0e91ad3a.scope. May 14 00:48:02.956224 systemd[1]: run-containerd-runc-k8s.io-0e1b2cd060b7e0c47711e5fd030f6258b6202fc7c8f15dd7b6d3570b0e91ad3a-runc.2u2teC.mount: Deactivated successfully. May 14 00:48:02.979000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981241 kernel: kauditd_printk_skb: 357 callbacks suppressed May 14 00:48:02.981298 kernel: audit: type=1400 audit(1747183682.979:460): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.979000 audit[1601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:02.985706 kernel: audit: type=1300 audit(1747183682.979:460): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:02.985754 kernel: audit: type=1327 audit(1747183682.979:460): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065316232636430363062376530633437373131653566643033306636 May 14 00:48:02.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065316232636430363062376530633437373131653566643033306636 May 14 00:48:02.988149 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.991709 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.991767 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.995193 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.995244 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.996941 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:03.000624 kernel: audit: type=1400 audit(1747183682.980:461): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.980000 audit: BPF prog-id=69 op=LOAD May 14 00:48:02.980000 audit[1601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:02.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065316232636430363062376530633437373131653566643033306636 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.981000 audit: BPF prog-id=70 op=LOAD May 14 00:48:02.981000 audit[1601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:02.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065316232636430363062376530633437373131653566643033306636 May 14 00:48:02.984000 audit: BPF prog-id=70 op=UNLOAD May 14 00:48:02.984000 audit: BPF prog-id=69 op=UNLOAD May 14 00:48:02.984000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:02.984000 audit: BPF prog-id=71 op=LOAD May 14 00:48:02.984000 audit[1601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:02.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065316232636430363062376530633437373131653566643033306636 May 14 00:48:03.002894 env[1217]: time="2025-05-14T00:48:03.002858843Z" level=info msg="StartContainer for \"0e1b2cd060b7e0c47711e5fd030f6258b6202fc7c8f15dd7b6d3570b0e91ad3a\" returns successfully" May 14 00:48:03.179000 audit[1662]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.179000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf6e59f0 a2=0 a3=1 items=0 ppid=1612 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:48:03.180000 audit[1663]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.180000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeae52e10 a2=0 a3=1 items=0 ppid=1612 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:48:03.181000 audit[1665]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.181000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff472a600 a2=0 a3=1 items=0 ppid=1612 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:48:03.182000 audit[1666]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.182000 audit[1666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2e13ca0 a2=0 a3=1 items=0 ppid=1612 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:48:03.184000 audit[1668]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.184000 audit[1668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc63b8f30 a2=0 a3=1 items=0 ppid=1612 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:48:03.184000 audit[1667]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.184000 audit[1667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfadba30 a2=0 a3=1 items=0 ppid=1612 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:48:03.282000 audit[1669]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.282000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff5727a20 a2=0 a3=1 items=0 ppid=1612 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:48:03.286000 audit[1671]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.286000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc41dc370 a2=0 a3=1 items=0 ppid=1612 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 14 00:48:03.289000 audit[1674]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.289000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde9e22a0 a2=0 a3=1 items=0 ppid=1612 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 14 00:48:03.290000 audit[1675]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.290000 audit[1675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc78fe860 a2=0 a3=1 items=0 ppid=1612 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:48:03.293000 audit[1677]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.293000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf191490 a2=0 a3=1 items=0 ppid=1612 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:48:03.294000 audit[1678]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.294000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff048ff40 a2=0 a3=1 items=0 ppid=1612 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:48:03.296000 audit[1680]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.296000 audit[1680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffebf3950 a2=0 a3=1 items=0 ppid=1612 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:48:03.299000 audit[1683]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.299000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff5286400 a2=0 a3=1 items=0 ppid=1612 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 14 00:48:03.300000 audit[1684]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.300000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2732590 a2=0 a3=1 items=0 ppid=1612 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:48:03.302000 audit[1686]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.302000 audit[1686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffecd08d20 a2=0 a3=1 items=0 ppid=1612 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:48:03.303000 audit[1687]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.303000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcaa0fc20 a2=0 a3=1 items=0 ppid=1612 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:48:03.305000 audit[1689]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.305000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd54f2d70 a2=0 a3=1 items=0 ppid=1612 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:48:03.309000 audit[1692]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.309000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe436fe50 a2=0 a3=1 items=0 ppid=1612 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:48:03.313000 audit[1695]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.313000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffddf8faf0 a2=0 a3=1 items=0 ppid=1612 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:48:03.314000 audit[1696]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.314000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc0a9440 a2=0 a3=1 items=0 ppid=1612 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:48:03.315000 audit[1698]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.315000 audit[1698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0e98cf0 a2=0 a3=1 items=0 ppid=1612 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:48:03.341000 audit[1702]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.341000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd734cae0 a2=0 a3=1 items=0 ppid=1612 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:48:03.342000 audit[1703]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.342000 audit[1703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8db7380 a2=0 a3=1 items=0 ppid=1612 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:48:03.344000 audit[1705]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:48:03.344000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffed34af80 a2=0 a3=1 items=0 ppid=1612 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:48:03.369000 audit[1711]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:03.369000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff31011d0 a2=0 a3=1 items=0 ppid=1612 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:03.391000 audit[1711]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:03.391000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff31011d0 a2=0 a3=1 items=0 ppid=1612 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:03.394000 audit[1718]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.394000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff3811f70 a2=0 a3=1 items=0 ppid=1612 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:48:03.396000 audit[1720]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.396000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff14fdf30 a2=0 a3=1 items=0 ppid=1612 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 14 00:48:03.399000 audit[1723]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.399000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe650fb90 a2=0 a3=1 items=0 ppid=1612 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 14 00:48:03.400000 audit[1724]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.400000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2ca1e00 a2=0 a3=1 items=0 ppid=1612 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:48:03.402000 audit[1726]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.402000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc771c6f0 a2=0 a3=1 items=0 ppid=1612 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:48:03.403000 audit[1727]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.403000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd05478c0 a2=0 a3=1 items=0 ppid=1612 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:48:03.407000 audit[1729]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.407000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc153d280 a2=0 a3=1 items=0 ppid=1612 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 14 00:48:03.410000 audit[1732]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.410000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc47b0a40 a2=0 a3=1 items=0 ppid=1612 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:48:03.411000 audit[1733]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.411000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1e7af00 a2=0 a3=1 items=0 ppid=1612 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:48:03.413000 audit[1735]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.413000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa1a44c0 a2=0 a3=1 items=0 ppid=1612 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:48:03.414000 audit[1736]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.414000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffefa6bfa0 a2=0 a3=1 items=0 ppid=1612 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:48:03.416000 audit[1738]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.416000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2918fb0 a2=0 a3=1 items=0 ppid=1612 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:48:03.418228 kubelet[1454]: E0514 00:48:03.418013 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:03.420000 audit[1741]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.420000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2c50780 a2=0 a3=1 items=0 ppid=1612 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:48:03.423000 audit[1744]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.423000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe982d4d0 a2=0 a3=1 items=0 ppid=1612 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 14 00:48:03.424000 audit[1745]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.424000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc3366ab0 a2=0 a3=1 items=0 ppid=1612 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:48:03.426000 audit[1747]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.426000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0558d80 a2=0 a3=1 items=0 ppid=1612 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:48:03.429000 audit[1750]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.429000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd13a88b0 a2=0 a3=1 items=0 ppid=1612 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:48:03.431000 audit[1751]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.431000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb6b5dc0 a2=0 a3=1 items=0 ppid=1612 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:48:03.433000 audit[1753]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.433000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc13d5e10 a2=0 a3=1 items=0 ppid=1612 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:48:03.434000 audit[1754]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.434000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5af5750 a2=0 a3=1 items=0 ppid=1612 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:48:03.436000 audit[1756]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.436000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc55feec0 a2=0 a3=1 items=0 ppid=1612 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:48:03.440000 audit[1759]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:48:03.440000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdc547760 a2=0 a3=1 items=0 ppid=1612 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:48:03.443000 audit[1761]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:48:03.443000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd90537a0 a2=0 a3=1 items=0 ppid=1612 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.443000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:03.443000 audit[1761]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:48:03.443000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd90537a0 a2=0 a3=1 items=0 ppid=1612 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:03.443000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:03.640923 kubelet[1454]: E0514 00:48:03.640894 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:03.650141 kubelet[1454]: I0514 00:48:03.649994 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hbsjc" podStartSLOduration=3.153393042 podStartE2EDuration="4.649980242s" podCreationTimestamp="2025-05-14 00:47:59 +0000 UTC" firstStartedPulling="2025-05-14 00:48:01.416580915 +0000 UTC m=+2.898539605" lastFinishedPulling="2025-05-14 00:48:02.913168115 +0000 UTC m=+4.395126805" observedRunningTime="2025-05-14 00:48:03.649139623 +0000 UTC m=+5.131098314" watchObservedRunningTime="2025-05-14 00:48:03.649980242 +0000 UTC m=+5.131938933" May 14 00:48:03.662293 kubelet[1454]: E0514 00:48:03.662260 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.662293 kubelet[1454]: W0514 00:48:03.662290 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.662382 kubelet[1454]: E0514 00:48:03.662310 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.662521 kubelet[1454]: E0514 00:48:03.662497 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.662577 kubelet[1454]: W0514 00:48:03.662512 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.662577 kubelet[1454]: E0514 00:48:03.662546 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.662725 kubelet[1454]: E0514 00:48:03.662702 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.662725 kubelet[1454]: W0514 00:48:03.662717 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.662774 kubelet[1454]: E0514 00:48:03.662727 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.662882 kubelet[1454]: E0514 00:48:03.662863 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.662882 kubelet[1454]: W0514 00:48:03.662876 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.662935 kubelet[1454]: E0514 00:48:03.662884 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663030 kubelet[1454]: E0514 00:48:03.663020 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663054 kubelet[1454]: W0514 00:48:03.663030 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663054 kubelet[1454]: E0514 00:48:03.663038 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663182 kubelet[1454]: E0514 00:48:03.663159 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663208 kubelet[1454]: W0514 00:48:03.663182 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663208 kubelet[1454]: E0514 00:48:03.663191 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663335 kubelet[1454]: E0514 00:48:03.663322 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663335 kubelet[1454]: W0514 00:48:03.663334 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663389 kubelet[1454]: E0514 00:48:03.663342 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663471 kubelet[1454]: E0514 00:48:03.663461 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663499 kubelet[1454]: W0514 00:48:03.663470 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663499 kubelet[1454]: E0514 00:48:03.663478 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663618 kubelet[1454]: E0514 00:48:03.663602 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663661 kubelet[1454]: W0514 00:48:03.663620 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663661 kubelet[1454]: E0514 00:48:03.663628 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663775 kubelet[1454]: E0514 00:48:03.663757 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663775 kubelet[1454]: W0514 00:48:03.663766 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663775 kubelet[1454]: E0514 00:48:03.663774 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.663905 kubelet[1454]: E0514 00:48:03.663893 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.663905 kubelet[1454]: W0514 00:48:03.663902 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.663960 kubelet[1454]: E0514 00:48:03.663909 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664044 kubelet[1454]: E0514 00:48:03.664033 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664044 kubelet[1454]: W0514 00:48:03.664043 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664091 kubelet[1454]: E0514 00:48:03.664050 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664205 kubelet[1454]: E0514 00:48:03.664196 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664234 kubelet[1454]: W0514 00:48:03.664206 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664234 kubelet[1454]: E0514 00:48:03.664213 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664362 kubelet[1454]: E0514 00:48:03.664349 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664362 kubelet[1454]: W0514 00:48:03.664361 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664411 kubelet[1454]: E0514 00:48:03.664368 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664492 kubelet[1454]: E0514 00:48:03.664483 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664516 kubelet[1454]: W0514 00:48:03.664492 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664516 kubelet[1454]: E0514 00:48:03.664500 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664625 kubelet[1454]: E0514 00:48:03.664615 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664649 kubelet[1454]: W0514 00:48:03.664626 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664649 kubelet[1454]: E0514 00:48:03.664633 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664841 kubelet[1454]: E0514 00:48:03.664817 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.664841 kubelet[1454]: W0514 00:48:03.664831 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.664841 kubelet[1454]: E0514 00:48:03.664840 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.664982 kubelet[1454]: E0514 00:48:03.664971 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.665005 kubelet[1454]: W0514 00:48:03.664982 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.665005 kubelet[1454]: E0514 00:48:03.664990 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.665119 kubelet[1454]: E0514 00:48:03.665110 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.665145 kubelet[1454]: W0514 00:48:03.665119 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.665145 kubelet[1454]: E0514 00:48:03.665127 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.665265 kubelet[1454]: E0514 00:48:03.665256 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.665290 kubelet[1454]: W0514 00:48:03.665266 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.665290 kubelet[1454]: E0514 00:48:03.665274 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.674670 kubelet[1454]: E0514 00:48:03.674636 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.674670 kubelet[1454]: W0514 00:48:03.674654 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.674670 kubelet[1454]: E0514 00:48:03.674668 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.674869 kubelet[1454]: E0514 00:48:03.674852 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.674869 kubelet[1454]: W0514 00:48:03.674865 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.674921 kubelet[1454]: E0514 00:48:03.674877 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.675043 kubelet[1454]: E0514 00:48:03.675031 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.675043 kubelet[1454]: W0514 00:48:03.675042 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.675101 kubelet[1454]: E0514 00:48:03.675051 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.675204 kubelet[1454]: E0514 00:48:03.675188 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.675204 kubelet[1454]: W0514 00:48:03.675199 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.675261 kubelet[1454]: E0514 00:48:03.675213 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.675436 kubelet[1454]: E0514 00:48:03.675414 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.675436 kubelet[1454]: W0514 00:48:03.675426 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.675514 kubelet[1454]: E0514 00:48:03.675439 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.675759 kubelet[1454]: E0514 00:48:03.675726 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.675759 kubelet[1454]: W0514 00:48:03.675747 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.675826 kubelet[1454]: E0514 00:48:03.675768 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.675982 kubelet[1454]: E0514 00:48:03.675961 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.675982 kubelet[1454]: W0514 00:48:03.675972 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676052 kubelet[1454]: E0514 00:48:03.675985 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.676150 kubelet[1454]: E0514 00:48:03.676130 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.676150 kubelet[1454]: W0514 00:48:03.676141 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676230 kubelet[1454]: E0514 00:48:03.676154 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.676330 kubelet[1454]: E0514 00:48:03.676307 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.676330 kubelet[1454]: W0514 00:48:03.676323 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676407 kubelet[1454]: E0514 00:48:03.676336 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.676507 kubelet[1454]: E0514 00:48:03.676489 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.676507 kubelet[1454]: W0514 00:48:03.676500 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676507 kubelet[1454]: E0514 00:48:03.676508 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.676665 kubelet[1454]: E0514 00:48:03.676646 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.676665 kubelet[1454]: W0514 00:48:03.676657 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676665 kubelet[1454]: E0514 00:48:03.676664 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.676989 kubelet[1454]: E0514 00:48:03.676966 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:48:03.676989 kubelet[1454]: W0514 00:48:03.676979 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:48:03.676989 kubelet[1454]: E0514 00:48:03.676988 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:48:03.956689 env[1217]: time="2025-05-14T00:48:03.956628238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:03.969757 env[1217]: time="2025-05-14T00:48:03.969712869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:04.056544 env[1217]: time="2025-05-14T00:48:04.056500689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:04.069420 env[1217]: time="2025-05-14T00:48:04.069374484Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:04.069898 env[1217]: time="2025-05-14T00:48:04.069853086Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 14 00:48:04.071968 env[1217]: time="2025-05-14T00:48:04.071935047Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 14 00:48:04.089553 env[1217]: time="2025-05-14T00:48:04.089505730Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\"" May 14 00:48:04.090174 env[1217]: time="2025-05-14T00:48:04.090132612Z" level=info msg="StartContainer for \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\"" May 14 00:48:04.106136 systemd[1]: Started cri-containerd-d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121.scope. May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1528 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363964326435326431636565363466336234323666383966623564 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit: BPF prog-id=72 op=LOAD May 14 00:48:04.129000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1528 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363964326435326431636565363466336234323666383966623564 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit: BPF prog-id=73 op=LOAD May 14 00:48:04.129000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1528 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363964326435326431636565363466336234323666383966623564 May 14 00:48:04.129000 audit: BPF prog-id=73 op=UNLOAD May 14 00:48:04.129000 audit: BPF prog-id=72 op=UNLOAD May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:04.129000 audit: BPF prog-id=74 op=LOAD May 14 00:48:04.129000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1528 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:04.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363964326435326431636565363466336234323666383966623564 May 14 00:48:04.150117 env[1217]: time="2025-05-14T00:48:04.150061227Z" level=info msg="StartContainer for \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\" returns successfully" May 14 00:48:04.174210 systemd[1]: cri-containerd-d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121.scope: Deactivated successfully. May 14 00:48:04.177000 audit: BPF prog-id=74 op=UNLOAD May 14 00:48:04.340786 env[1217]: time="2025-05-14T00:48:04.340671901Z" level=info msg="shim disconnected" id=d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121 May 14 00:48:04.340786 env[1217]: time="2025-05-14T00:48:04.340718619Z" level=warning msg="cleaning up after shim disconnected" id=d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121 namespace=k8s.io May 14 00:48:04.340786 env[1217]: time="2025-05-14T00:48:04.340728357Z" level=info msg="cleaning up dead shim" May 14 00:48:04.347695 env[1217]: time="2025-05-14T00:48:04.347654801Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1838 runtime=io.containerd.runc.v2\n" May 14 00:48:04.418816 kubelet[1454]: E0514 00:48:04.418769 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:04.632922 kubelet[1454]: E0514 00:48:04.632800 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:04.643042 kubelet[1454]: E0514 00:48:04.643007 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:04.643132 kubelet[1454]: E0514 00:48:04.643064 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:04.643851 env[1217]: time="2025-05-14T00:48:04.643818537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 14 00:48:04.926351 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121-rootfs.mount: Deactivated successfully. May 14 00:48:05.419589 kubelet[1454]: E0514 00:48:05.419414 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:06.420302 kubelet[1454]: E0514 00:48:06.420228 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:06.633031 kubelet[1454]: E0514 00:48:06.632944 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:06.768000 audit[1856]: NETFILTER_CFG table=filter:65 family=2 entries=18 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.768000 audit[1856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc5058780 a2=0 a3=1 items=0 ppid=1612 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.775000 audit[1856]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.775000 audit[1856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc5058780 a2=0 a3=1 items=0 ppid=1612 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.787000 audit[1858]: NETFILTER_CFG table=filter:67 family=2 entries=15 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.787000 audit[1858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd21e66f0 a2=0 a3=1 items=0 ppid=1612 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:06.797000 audit[1858]: NETFILTER_CFG table=nat:68 family=2 entries=33 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:06.797000 audit[1858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffd21e66f0 a2=0 a3=1 items=0 ppid=1612 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:06.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:07.414060 env[1217]: time="2025-05-14T00:48:07.414010805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:07.415188 env[1217]: time="2025-05-14T00:48:07.415152153Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:07.416400 env[1217]: time="2025-05-14T00:48:07.416373581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:07.417569 env[1217]: time="2025-05-14T00:48:07.417541074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:07.418143 env[1217]: time="2025-05-14T00:48:07.418112391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 14 00:48:07.420225 env[1217]: time="2025-05-14T00:48:07.420190915Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 14 00:48:07.421238 kubelet[1454]: E0514 00:48:07.421210 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:07.436478 env[1217]: time="2025-05-14T00:48:07.436430354Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\"" May 14 00:48:07.437332 env[1217]: time="2025-05-14T00:48:07.436846493Z" level=info msg="StartContainer for \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\"" May 14 00:48:07.457873 systemd[1]: Started cri-containerd-72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142.scope. May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1528 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626363366664643565653564613132663762393263393330386666 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.480000 audit: BPF prog-id=75 op=LOAD May 14 00:48:07.480000 audit[1868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1528 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626363366664643565653564613132663762393263393330386666 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit: BPF prog-id=76 op=LOAD May 14 00:48:07.481000 audit[1868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1528 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626363366664643565653564613132663762393263393330386666 May 14 00:48:07.481000 audit: BPF prog-id=76 op=UNLOAD May 14 00:48:07.481000 audit: BPF prog-id=75 op=UNLOAD May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:07.481000 audit: BPF prog-id=77 op=LOAD May 14 00:48:07.481000 audit[1868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1528 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626363366664643565653564613132663762393263393330386666 May 14 00:48:07.497196 env[1217]: time="2025-05-14T00:48:07.496464973Z" level=info msg="StartContainer for \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\" returns successfully" May 14 00:48:07.652516 kubelet[1454]: E0514 00:48:07.652478 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:07.783000 audit[1898]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:07.783000 audit[1898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd63c34c0 a2=0 a3=1 items=0 ppid=1612 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:07.793000 audit[1898]: NETFILTER_CFG table=nat:70 family=2 entries=18 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:07.793000 audit[1898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=ffffd63c34c0 a2=0 a3=1 items=0 ppid=1612 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:07.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.017423 env[1217]: time="2025-05-14T00:48:08.017346516Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:48:08.019844 systemd[1]: cri-containerd-72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142.scope: Deactivated successfully. May 14 00:48:08.025485 kernel: kauditd_printk_skb: 291 callbacks suppressed May 14 00:48:08.025576 kernel: audit: type=1334 audit(1747183688.023:536): prog-id=77 op=UNLOAD May 14 00:48:08.023000 audit: BPF prog-id=77 op=UNLOAD May 14 00:48:08.037890 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142-rootfs.mount: Deactivated successfully. May 14 00:48:08.101795 kubelet[1454]: I0514 00:48:08.101748 1454 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 14 00:48:08.168371 env[1217]: time="2025-05-14T00:48:08.168323220Z" level=info msg="shim disconnected" id=72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142 May 14 00:48:08.168576 env[1217]: time="2025-05-14T00:48:08.168558200Z" level=warning msg="cleaning up after shim disconnected" id=72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142 namespace=k8s.io May 14 00:48:08.168647 env[1217]: time="2025-05-14T00:48:08.168634185Z" level=info msg="cleaning up dead shim" May 14 00:48:08.175173 env[1217]: time="2025-05-14T00:48:08.175127841Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1911 runtime=io.containerd.runc.v2\n" May 14 00:48:08.421625 kubelet[1454]: E0514 00:48:08.421508 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:08.637854 systemd[1]: Created slice kubepods-besteffort-pod8996e0dd_449a_4bca_bc28_75021d9f9084.slice. May 14 00:48:08.639899 env[1217]: time="2025-05-14T00:48:08.639862260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bl8sx,Uid:8996e0dd-449a-4bca-bc28-75021d9f9084,Namespace:calico-system,Attempt:0,}" May 14 00:48:08.658737 kubelet[1454]: E0514 00:48:08.658234 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:08.662075 env[1217]: time="2025-05-14T00:48:08.661991427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 14 00:48:08.792243 env[1217]: time="2025-05-14T00:48:08.792021209Z" level=error msg="Failed to destroy network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:08.793505 env[1217]: time="2025-05-14T00:48:08.793448308Z" level=error msg="encountered an error cleaning up failed sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:08.793546 env[1217]: time="2025-05-14T00:48:08.793517711Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bl8sx,Uid:8996e0dd-449a-4bca-bc28-75021d9f9084,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:08.793674 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b-shm.mount: Deactivated successfully. May 14 00:48:08.793809 kubelet[1454]: E0514 00:48:08.793774 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:08.793868 kubelet[1454]: E0514 00:48:08.793846 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:08.793915 kubelet[1454]: E0514 00:48:08.793873 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bl8sx" May 14 00:48:08.793950 kubelet[1454]: E0514 00:48:08.793917 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bl8sx_calico-system(8996e0dd-449a-4bca-bc28-75021d9f9084)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bl8sx_calico-system(8996e0dd-449a-4bca-bc28-75021d9f9084)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:08.802000 audit[1960]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.802000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd0e9b610 a2=0 a3=1 items=0 ppid=1612 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.808023 kernel: audit: type=1325 audit(1747183688.802:537): table=filter:71 family=2 entries=12 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.808125 kernel: audit: type=1300 audit(1747183688.802:537): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd0e9b610 a2=0 a3=1 items=0 ppid=1612 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.808163 kernel: audit: type=1327 audit(1747183688.802:537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.818000 audit[1960]: NETFILTER_CFG table=nat:72 family=2 entries=54 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.818000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffd0e9b610 a2=0 a3=1 items=0 ppid=1612 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.824368 kernel: audit: type=1325 audit(1747183688.818:538): table=nat:72 family=2 entries=54 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:08.824419 kernel: audit: type=1300 audit(1747183688.818:538): arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffd0e9b610 a2=0 a3=1 items=0 ppid=1612 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:08.824439 kernel: audit: type=1327 audit(1747183688.818:538): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:08.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:09.422234 kubelet[1454]: E0514 00:48:09.421862 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:09.660777 kubelet[1454]: I0514 00:48:09.660153 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:09.660938 env[1217]: time="2025-05-14T00:48:09.660889334Z" level=info msg="StopPodSandbox for \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\"" May 14 00:48:09.683342 env[1217]: time="2025-05-14T00:48:09.683205210Z" level=error msg="StopPodSandbox for \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\" failed" error="failed to destroy network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:09.683830 kubelet[1454]: E0514 00:48:09.683617 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:09.683830 kubelet[1454]: E0514 00:48:09.683693 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b"} May 14 00:48:09.683830 kubelet[1454]: E0514 00:48:09.683761 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8996e0dd-449a-4bca-bc28-75021d9f9084\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:48:09.683830 kubelet[1454]: E0514 00:48:09.683783 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8996e0dd-449a-4bca-bc28-75021d9f9084\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bl8sx" podUID="8996e0dd-449a-4bca-bc28-75021d9f9084" May 14 00:48:10.163000 audit[1987]: NETFILTER_CFG table=filter:73 family=2 entries=11 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.163000 audit[1987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd26f1460 a2=0 a3=1 items=0 ppid=1612 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.169103 kernel: audit: type=1325 audit(1747183690.163:539): table=filter:73 family=2 entries=11 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.169194 kernel: audit: type=1300 audit(1747183690.163:539): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd26f1460 a2=0 a3=1 items=0 ppid=1612 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.169228 kernel: audit: type=1327 audit(1747183690.163:539): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.175000 audit[1987]: NETFILTER_CFG table=nat:74 family=2 entries=25 op=nft_register_chain pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:10.175000 audit[1987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffd26f1460 a2=0 a3=1 items=0 ppid=1612 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:10.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:10.422206 kubelet[1454]: E0514 00:48:10.422054 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:11.090489 systemd[1]: Created slice kubepods-besteffort-pod31a33534_d292_4142_a6b2_6fca18000571.slice. May 14 00:48:11.134601 kubelet[1454]: I0514 00:48:11.134556 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mr2n6\" (UniqueName: \"kubernetes.io/projected/31a33534-d292-4142-a6b2-6fca18000571-kube-api-access-mr2n6\") pod \"nginx-deployment-7fcdb87857-78dbw\" (UID: \"31a33534-d292-4142-a6b2-6fca18000571\") " pod="default/nginx-deployment-7fcdb87857-78dbw" May 14 00:48:11.394961 env[1217]: time="2025-05-14T00:48:11.394855502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-78dbw,Uid:31a33534-d292-4142-a6b2-6fca18000571,Namespace:default,Attempt:0,}" May 14 00:48:11.423244 kubelet[1454]: E0514 00:48:11.423199 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:11.461260 env[1217]: time="2025-05-14T00:48:11.461190525Z" level=error msg="Failed to destroy network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:11.461585 env[1217]: time="2025-05-14T00:48:11.461543792Z" level=error msg="encountered an error cleaning up failed sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:11.461637 env[1217]: time="2025-05-14T00:48:11.461595152Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-78dbw,Uid:31a33534-d292-4142-a6b2-6fca18000571,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:11.461849 kubelet[1454]: E0514 00:48:11.461818 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:11.461902 kubelet[1454]: E0514 00:48:11.461873 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-78dbw" May 14 00:48:11.461933 kubelet[1454]: E0514 00:48:11.461895 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-78dbw" May 14 00:48:11.461960 kubelet[1454]: E0514 00:48:11.461935 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-78dbw_default(31a33534-d292-4142-a6b2-6fca18000571)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-78dbw_default(31a33534-d292-4142-a6b2-6fca18000571)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-78dbw" podUID="31a33534-d292-4142-a6b2-6fca18000571" May 14 00:48:11.462877 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72-shm.mount: Deactivated successfully. May 14 00:48:11.664051 kubelet[1454]: I0514 00:48:11.663963 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:11.664746 env[1217]: time="2025-05-14T00:48:11.664711884Z" level=info msg="StopPodSandbox for \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\"" May 14 00:48:11.686112 env[1217]: time="2025-05-14T00:48:11.686048131Z" level=error msg="StopPodSandbox for \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\" failed" error="failed to destroy network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:48:11.686366 kubelet[1454]: E0514 00:48:11.686298 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:11.686426 kubelet[1454]: E0514 00:48:11.686375 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72"} May 14 00:48:11.686426 kubelet[1454]: E0514 00:48:11.686409 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31a33534-d292-4142-a6b2-6fca18000571\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:48:11.686503 kubelet[1454]: E0514 00:48:11.686430 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31a33534-d292-4142-a6b2-6fca18000571\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-78dbw" podUID="31a33534-d292-4142-a6b2-6fca18000571" May 14 00:48:12.424087 kubelet[1454]: E0514 00:48:12.424033 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:13.017758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283200495.mount: Deactivated successfully. May 14 00:48:13.108524 env[1217]: time="2025-05-14T00:48:13.108468995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:13.109664 env[1217]: time="2025-05-14T00:48:13.109632601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:13.110815 env[1217]: time="2025-05-14T00:48:13.110738022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:13.112551 env[1217]: time="2025-05-14T00:48:13.112519055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:13.112864 env[1217]: time="2025-05-14T00:48:13.112805729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 14 00:48:13.124867 env[1217]: time="2025-05-14T00:48:13.124835733Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 14 00:48:13.135913 env[1217]: time="2025-05-14T00:48:13.135871595Z" level=info msg="CreateContainer within sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\"" May 14 00:48:13.136410 env[1217]: time="2025-05-14T00:48:13.136381069Z" level=info msg="StartContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\"" May 14 00:48:13.151610 systemd[1]: Started cri-containerd-9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9.scope. May 14 00:48:13.176000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.178641 kernel: kauditd_printk_skb: 3 callbacks suppressed May 14 00:48:13.178688 kernel: audit: type=1400 audit(1747183693.176:541): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.176000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1528 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.182989 kernel: audit: type=1300 audit(1747183693.176:541): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1528 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.183034 kernel: audit: type=1327 audit(1747183693.176:541): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323965663435653530643530623231646263653935643736303435 May 14 00:48:13.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323965663435653530643530623231646263653935643736303435 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187210 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187267 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.190619 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.190672 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.192359 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.196065 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.196129 kernel: audit: type=1400 audit(1747183693.184:542): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.184000 audit: BPF prog-id=78 op=LOAD May 14 00:48:13.184000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1528 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323965663435653530643530623231646263653935643736303435 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.186000 audit: BPF prog-id=79 op=LOAD May 14 00:48:13.186000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1528 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323965663435653530643530623231646263653935643736303435 May 14 00:48:13.187000 audit: BPF prog-id=79 op=UNLOAD May 14 00:48:13.187000 audit: BPF prog-id=78 op=UNLOAD May 14 00:48:13.187000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:13.187000 audit: BPF prog-id=80 op=LOAD May 14 00:48:13.187000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1528 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323965663435653530643530623231646263653935643736303435 May 14 00:48:13.219884 env[1217]: time="2025-05-14T00:48:13.219830415Z" level=info msg="StartContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" returns successfully" May 14 00:48:13.358212 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 14 00:48:13.358354 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 14 00:48:13.424389 kubelet[1454]: E0514 00:48:13.424344 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:13.669060 kubelet[1454]: E0514 00:48:13.668955 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:13.684621 kubelet[1454]: I0514 00:48:13.684415 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4gvkl" podStartSLOduration=2.99422434 podStartE2EDuration="14.684398733s" podCreationTimestamp="2025-05-14 00:47:59 +0000 UTC" firstStartedPulling="2025-05-14 00:48:01.423658297 +0000 UTC m=+2.905616987" lastFinishedPulling="2025-05-14 00:48:13.11383269 +0000 UTC m=+14.595791380" observedRunningTime="2025-05-14 00:48:13.684205547 +0000 UTC m=+15.166164317" watchObservedRunningTime="2025-05-14 00:48:13.684398733 +0000 UTC m=+15.166357423" May 14 00:48:13.900000 audit[2122]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:13.900000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc7519a80 a2=0 a3=1 items=0 ppid=1612 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:13.918000 audit[2122]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:13.918000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc7519a80 a2=0 a3=1 items=0 ppid=1612 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:13.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:14.424780 kubelet[1454]: E0514 00:48:14.424735 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:14.583000 audit[2162]: AVC avc: denied { write } for pid=2162 comm="tee" name="fd" dev="proc" ino=13857 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.583000 audit[2162]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc70f8a2a a2=241 a3=1b6 items=1 ppid=2141 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.583000 audit: CWD cwd="/etc/service/enabled/bird/log" May 14 00:48:14.583000 audit: PATH item=0 name="/dev/fd/63" inode=13852 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.583000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.593000 audit[2182]: AVC avc: denied { write } for pid=2182 comm="tee" name="fd" dev="proc" ino=14780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.593000 audit[2182]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0853a29 a2=241 a3=1b6 items=1 ppid=2132 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.593000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 14 00:48:14.593000 audit: PATH item=0 name="/dev/fd/63" inode=14775 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.593000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.594000 audit[2194]: AVC avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=14785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.594000 audit[2194]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe12aa19 a2=241 a3=1b6 items=1 ppid=2149 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.594000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 14 00:48:14.594000 audit: PATH item=0 name="/dev/fd/63" inode=14782 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.594000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.596000 audit[2173]: AVC avc: denied { write } for pid=2173 comm="tee" name="fd" dev="proc" ino=15792 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.596000 audit[2173]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffea9a3a29 a2=241 a3=1b6 items=1 ppid=2142 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.596000 audit: CWD cwd="/etc/service/enabled/felix/log" May 14 00:48:14.596000 audit: PATH item=0 name="/dev/fd/63" inode=15787 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.603000 audit[2205]: AVC avc: denied { write } for pid=2205 comm="tee" name="fd" dev="proc" ino=14791 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.603000 audit[2205]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6889a1a a2=241 a3=1b6 items=1 ppid=2134 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.603000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 14 00:48:14.603000 audit: PATH item=0 name="/dev/fd/63" inode=13177 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.611000 audit[2202]: AVC avc: denied { write } for pid=2202 comm="tee" name="fd" dev="proc" ino=14797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.611000 audit[2202]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2d6da29 a2=241 a3=1b6 items=1 ppid=2131 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.611000 audit: CWD cwd="/etc/service/enabled/confd/log" May 14 00:48:14.611000 audit: PATH item=0 name="/dev/fd/63" inode=13176 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.612000 audit[2210]: AVC avc: denied { write } for pid=2210 comm="tee" name="fd" dev="proc" ino=13869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:14.612000 audit[2210]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3243a2b a2=241 a3=1b6 items=1 ppid=2133 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.612000 audit: CWD cwd="/etc/service/enabled/cni/log" May 14 00:48:14.612000 audit: PATH item=0 name="/dev/fd/63" inode=13180 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:14.612000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:14.669886 kubelet[1454]: I0514 00:48:14.669851 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:14.670274 kubelet[1454]: E0514 00:48:14.670243 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:14.716000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.716000 audit: BPF prog-id=81 op=LOAD May 14 00:48:14.716000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc52b6f8 a2=98 a3=fffffc52b6e8 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.716000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.717000 audit: BPF prog-id=81 op=UNLOAD May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit: BPF prog-id=82 op=LOAD May 14 00:48:14.717000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffc52b388 a2=74 a3=95 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.717000 audit: BPF prog-id=82 op=UNLOAD May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.717000 audit: BPF prog-id=83 op=LOAD May 14 00:48:14.717000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffc52b3e8 a2=94 a3=2 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.717000 audit: BPF prog-id=83 op=UNLOAD May 14 00:48:14.802000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit: BPF prog-id=84 op=LOAD May 14 00:48:14.802000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffc52b3a8 a2=40 a3=fffffc52b3d8 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.802000 audit: BPF prog-id=84 op=UNLOAD May 14 00:48:14.802000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.802000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffc52b4c0 a2=50 a3=0 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b418 a2=28 a3=fffffc52b548 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc52b448 a2=28 a3=fffffc52b578 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc52b2f8 a2=28 a3=fffffc52b428 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b468 a2=28 a3=fffffc52b598 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b448 a2=28 a3=fffffc52b578 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b438 a2=28 a3=fffffc52b568 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b468 a2=28 a3=fffffc52b598 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc52b448 a2=28 a3=fffffc52b578 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc52b468 a2=28 a3=fffffc52b598 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc52b438 a2=28 a3=fffffc52b568 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffc52b4b8 a2=28 a3=fffffc52b5f8 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffc52b1f0 a2=50 a3=0 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit: BPF prog-id=85 op=LOAD May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffc52b1f8 a2=94 a3=5 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit: BPF prog-id=85 op=UNLOAD May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffc52b300 a2=50 a3=0 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffc52b448 a2=4 a3=3 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.811000 audit[2250]: AVC avc: denied { confidentiality } for pid=2250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.811000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffc52b428 a2=94 a3=6 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { confidentiality } for pid=2250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.812000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffc52abf8 a2=94 a3=83 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.812000 audit[2250]: AVC avc: denied { confidentiality } for pid=2250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.812000 audit[2250]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffc52abf8 a2=94 a3=83 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit: BPF prog-id=86 op=LOAD May 14 00:48:14.823000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff2f1da48 a2=98 a3=fffff2f1da38 items=0 ppid=2143 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.823000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:14.823000 audit: BPF prog-id=86 op=UNLOAD May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit: BPF prog-id=87 op=LOAD May 14 00:48:14.823000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff2f1d8f8 a2=74 a3=95 items=0 ppid=2143 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.823000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:14.823000 audit: BPF prog-id=87 op=UNLOAD May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.823000 audit: BPF prog-id=88 op=LOAD May 14 00:48:14.823000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff2f1d928 a2=40 a3=fffff2f1d958 items=0 ppid=2143 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.823000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:14.823000 audit: BPF prog-id=88 op=UNLOAD May 14 00:48:14.870306 systemd-networkd[1047]: vxlan.calico: Link UP May 14 00:48:14.870315 systemd-networkd[1047]: vxlan.calico: Gained carrier May 14 00:48:14.891000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.891000 audit: BPF prog-id=89 op=LOAD May 14 00:48:14.891000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1aed128 a2=98 a3=ffffe1aed118 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.891000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.891000 audit: BPF prog-id=89 op=UNLOAD May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit: BPF prog-id=90 op=LOAD May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1aece08 a2=74 a3=95 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit: BPF prog-id=90 op=UNLOAD May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit: BPF prog-id=91 op=LOAD May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1aece68 a2=94 a3=2 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit: BPF prog-id=91 op=UNLOAD May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aece98 a2=28 a3=ffffe1aecfc8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1aecec8 a2=28 a3=ffffe1aecff8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1aecd78 a2=28 a3=ffffe1aecea8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aecee8 a2=28 a3=ffffe1aed018 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aecec8 a2=28 a3=ffffe1aecff8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aeceb8 a2=28 a3=ffffe1aecfe8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aecee8 a2=28 a3=ffffe1aed018 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1aecec8 a2=28 a3=ffffe1aecff8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1aecee8 a2=28 a3=ffffe1aed018 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1aeceb8 a2=28 a3=ffffe1aecfe8 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe1aecf38 a2=28 a3=ffffe1aed078 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.892000 audit: BPF prog-id=92 op=LOAD May 14 00:48:14.892000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe1aecd58 a2=40 a3=ffffe1aecd88 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.892000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.892000 audit: BPF prog-id=92 op=UNLOAD May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe1aecd80 a2=50 a3=0 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe1aecd80 a2=50 a3=0 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit: BPF prog-id=93 op=LOAD May 14 00:48:14.893000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe1aec4e8 a2=94 a3=2 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.893000 audit: BPF prog-id=93 op=UNLOAD May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.893000 audit: BPF prog-id=94 op=LOAD May 14 00:48:14.893000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe1aec678 a2=94 a3=30 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit: BPF prog-id=95 op=LOAD May 14 00:48:14.898000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffabd0d38 a2=98 a3=fffffabd0d28 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.898000 audit: BPF prog-id=95 op=UNLOAD May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit: BPF prog-id=96 op=LOAD May 14 00:48:14.898000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffabd09c8 a2=74 a3=95 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.898000 audit: BPF prog-id=96 op=UNLOAD May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.898000 audit: BPF prog-id=97 op=LOAD May 14 00:48:14.898000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffabd0a28 a2=94 a3=2 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.898000 audit: BPF prog-id=97 op=UNLOAD May 14 00:48:14.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.982000 audit: BPF prog-id=98 op=LOAD May 14 00:48:14.982000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffabd09e8 a2=40 a3=fffffabd0a18 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.983000 audit: BPF prog-id=98 op=UNLOAD May 14 00:48:14.983000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.983000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffabd0b00 a2=50 a3=0 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0a58 a2=28 a3=fffffabd0b88 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffabd0a88 a2=28 a3=fffffabd0bb8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffabd0938 a2=28 a3=fffffabd0a68 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0aa8 a2=28 a3=fffffabd0bd8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0a88 a2=28 a3=fffffabd0bb8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0a78 a2=28 a3=fffffabd0ba8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0aa8 a2=28 a3=fffffabd0bd8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffabd0a88 a2=28 a3=fffffabd0bb8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffabd0aa8 a2=28 a3=fffffabd0bd8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffabd0a78 a2=28 a3=fffffabd0ba8 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffabd0af8 a2=28 a3=fffffabd0c38 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffabd0830 a2=50 a3=0 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.995000 audit: BPF prog-id=99 op=LOAD May 14 00:48:14.995000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffabd0838 a2=94 a3=5 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit: BPF prog-id=99 op=UNLOAD May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffabd0940 a2=50 a3=0 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffabd0a88 a2=4 a3=3 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { confidentiality } for pid=2289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffabd0a68 a2=94 a3=6 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { confidentiality } for pid=2289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffabd0238 a2=94 a3=83 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { confidentiality } for pid=2289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffabd0238 a2=94 a3=83 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffabd1c78 a2=10 a3=fffffabd1d68 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffabd1b38 a2=10 a3=fffffabd1c28 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffabd1aa8 a2=10 a3=fffffabd1c28 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:14.996000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:14.996000 audit[2289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffabd1aa8 a2=10 a3=fffffabd1c28 items=0 ppid=2143 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:14.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:15.004000 audit: BPF prog-id=94 op=UNLOAD May 14 00:48:15.062000 audit[2312]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:15.062000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd235b950 a2=0 a3=ffff9c990fa8 items=0 ppid=2143 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:15.062000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:15.069000 audit[2316]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:15.069000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcc7ee140 a2=0 a3=ffff8b77cfa8 items=0 ppid=2143 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:15.069000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:15.069000 audit[2314]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:15.069000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd97772c0 a2=0 a3=ffff925e0fa8 items=0 ppid=2143 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:15.069000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:15.070000 audit[2311]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:15.070000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc991dc90 a2=0 a3=ffff88406fa8 items=0 ppid=2143 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:15.070000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:15.425387 kubelet[1454]: E0514 00:48:15.425335 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:16.426231 kubelet[1454]: E0514 00:48:16.426148 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:16.813370 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL May 14 00:48:17.426775 kubelet[1454]: E0514 00:48:17.426732 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:18.427417 kubelet[1454]: E0514 00:48:18.427358 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:18.753776 kubelet[1454]: I0514 00:48:18.753648 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:18.754098 kubelet[1454]: E0514 00:48:18.754075 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:18.857973 systemd[1]: run-containerd-runc-k8s.io-9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9-runc.KE7Pcd.mount: Deactivated successfully. May 14 00:48:19.415655 kubelet[1454]: E0514 00:48:19.415610 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:19.428270 kubelet[1454]: E0514 00:48:19.428205 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:19.678704 kubelet[1454]: E0514 00:48:19.678572 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:20.429286 kubelet[1454]: E0514 00:48:20.429221 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:21.430284 kubelet[1454]: E0514 00:48:21.430240 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:22.430750 kubelet[1454]: E0514 00:48:22.430694 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:23.431468 kubelet[1454]: E0514 00:48:23.431420 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:23.635430 env[1217]: time="2025-05-14T00:48:23.635355042Z" level=info msg="StopPodSandbox for \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\"" May 14 00:48:23.751000 audit[2414]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.753622 kernel: kauditd_printk_skb: 554 callbacks suppressed May 14 00:48:23.753705 kernel: audit: type=1325 audit(1747183703.751:651): table=filter:81 family=2 entries=8 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.751000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff64f9ca0 a2=0 a3=1 items=0 ppid=1612 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.759236 kernel: audit: type=1300 audit(1747183703.751:651): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff64f9ca0 a2=0 a3=1 items=0 ppid=1612 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.759309 kernel: audit: type=1327 audit(1747183703.751:651): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.684 [INFO][2398] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.684 [INFO][2398] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" iface="eth0" netns="/var/run/netns/cni-7c4ff6ee-9577-a55a-fc9e-836149a479b3" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.685 [INFO][2398] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" iface="eth0" netns="/var/run/netns/cni-7c4ff6ee-9577-a55a-fc9e-836149a479b3" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.685 [INFO][2398] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" iface="eth0" netns="/var/run/netns/cni-7c4ff6ee-9577-a55a-fc9e-836149a479b3" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.685 [INFO][2398] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.685 [INFO][2398] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.738 [INFO][2406] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" HandleID="k8s-pod-network.c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.738 [INFO][2406] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.738 [INFO][2406] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.750 [WARNING][2406] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" HandleID="k8s-pod-network.c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.750 [INFO][2406] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" HandleID="k8s-pod-network.c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.753 [INFO][2406] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:23.760986 env[1217]: 2025-05-14 00:48:23.755 [INFO][2398] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b" May 14 00:48:23.762872 systemd[1]: run-netns-cni\x2d7c4ff6ee\x2d9577\x2da55a\x2dfc9e\x2d836149a479b3.mount: Deactivated successfully. May 14 00:48:23.767075 env[1217]: time="2025-05-14T00:48:23.764225875Z" level=info msg="TearDown network for sandbox \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\" successfully" May 14 00:48:23.767075 env[1217]: time="2025-05-14T00:48:23.764267097Z" level=info msg="StopPodSandbox for \"c509540396df17d642aa47e97b12996d5bbce053c82b090dbbb665baf556d70b\" returns successfully" May 14 00:48:23.767075 env[1217]: time="2025-05-14T00:48:23.764971192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bl8sx,Uid:8996e0dd-449a-4bca-bc28-75021d9f9084,Namespace:calico-system,Attempt:1,}" May 14 00:48:23.770000 audit[2414]: NETFILTER_CFG table=nat:82 family=2 entries=34 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.770000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff64f9ca0 a2=0 a3=1 items=0 ppid=1612 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.778219 kernel: audit: type=1325 audit(1747183703.770:652): table=nat:82 family=2 entries=34 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.778293 kernel: audit: type=1300 audit(1747183703.770:652): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff64f9ca0 a2=0 a3=1 items=0 ppid=1612 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.778324 kernel: audit: type=1327 audit(1747183703.770:652): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.787000 audit[2428]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.787000 audit[2428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcc6f8fc0 a2=0 a3=1 items=0 ppid=1612 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.791731 kernel: audit: type=1325 audit(1747183703.787:653): table=filter:83 family=2 entries=8 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.791811 kernel: audit: type=1300 audit(1747183703.787:653): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcc6f8fc0 a2=0 a3=1 items=0 ppid=1612 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.791830 kernel: audit: type=1327 audit(1747183703.787:653): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.798730 systemd[1]: Created slice kubepods-besteffort-pod6ffe609e_d632_4d0d_a076_47570fa42b32.slice. May 14 00:48:23.799000 audit[2428]: NETFILTER_CFG table=nat:84 family=2 entries=36 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.799000 audit[2428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffcc6f8fc0 a2=0 a3=1 items=0 ppid=1612 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:23.802185 kernel: audit: type=1325 audit(1747183703.799:654): table=nat:84 family=2 entries=36 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:23.806592 kubelet[1454]: I0514 00:48:23.806490 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9556\" (UniqueName: \"kubernetes.io/projected/6ffe609e-d632-4d0d-a076-47570fa42b32-kube-api-access-l9556\") pod \"calico-apiserver-5c856d6799-b4pwc\" (UID: \"6ffe609e-d632-4d0d-a076-47570fa42b32\") " pod="calico-apiserver/calico-apiserver-5c856d6799-b4pwc" May 14 00:48:23.806592 kubelet[1454]: I0514 00:48:23.806558 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6ffe609e-d632-4d0d-a076-47570fa42b32-calico-apiserver-certs\") pod \"calico-apiserver-5c856d6799-b4pwc\" (UID: \"6ffe609e-d632-4d0d-a076-47570fa42b32\") " pod="calico-apiserver/calico-apiserver-5c856d6799-b4pwc" May 14 00:48:23.892865 systemd-networkd[1047]: cali1659ca1704e: Link UP May 14 00:48:23.895081 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:23.895148 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1659ca1704e: link becomes ready May 14 00:48:23.894858 systemd-networkd[1047]: cali1659ca1704e: Gained carrier May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.819 [INFO][2416] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.102-k8s-csi--node--driver--bl8sx-eth0 csi-node-driver- calico-system 8996e0dd-449a-4bca-bc28-75021d9f9084 1097 0 2025-05-14 00:47:59 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.102 csi-node-driver-bl8sx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1659ca1704e [] []}} ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.819 [INFO][2416] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.846 [INFO][2433] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" HandleID="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.860 [INFO][2433] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" HandleID="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002876c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.102", "pod":"csi-node-driver-bl8sx", "timestamp":"2025-05-14 00:48:23.846882412 +0000 UTC"}, Hostname:"10.0.0.102", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.860 [INFO][2433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.860 [INFO][2433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.860 [INFO][2433] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.102' May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.864 [INFO][2433] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.868 [INFO][2433] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.873 [INFO][2433] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.875 [INFO][2433] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.877 [INFO][2433] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.877 [INFO][2433] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.879 [INFO][2433] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62 May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.884 [INFO][2433] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.889 [INFO][2433] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.193/26] block=192.168.54.192/26 handle="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.889 [INFO][2433] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.193/26] handle="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" host="10.0.0.102" May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.889 [INFO][2433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:23.905271 env[1217]: 2025-05-14 00:48:23.889 [INFO][2433] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.193/26] IPv6=[] ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" HandleID="k8s-pod-network.7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Workload="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.890 [INFO][2416] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-csi--node--driver--bl8sx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8996e0dd-449a-4bca-bc28-75021d9f9084", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"", Pod:"csi-node-driver-bl8sx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1659ca1704e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.890 [INFO][2416] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.193/32] ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.890 [INFO][2416] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1659ca1704e ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.895 [INFO][2416] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.895 [INFO][2416] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-csi--node--driver--bl8sx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8996e0dd-449a-4bca-bc28-75021d9f9084", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 47, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62", Pod:"csi-node-driver-bl8sx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1659ca1704e", MAC:"56:4e:c0:9d:93:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:23.905795 env[1217]: 2025-05-14 00:48:23.903 [INFO][2416] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62" Namespace="calico-system" Pod="csi-node-driver-bl8sx" WorkloadEndpoint="10.0.0.102-k8s-csi--node--driver--bl8sx-eth0" May 14 00:48:23.917000 audit[2459]: NETFILTER_CFG table=filter:85 family=2 entries=34 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:23.917000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffffbaa6fc0 a2=0 a3=ffff8c144fa8 items=0 ppid=2143 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.917000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:23.922480 env[1217]: time="2025-05-14T00:48:23.922411187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:23.922480 env[1217]: time="2025-05-14T00:48:23.922456171Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:23.922609 env[1217]: time="2025-05-14T00:48:23.922475021Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:23.922775 env[1217]: time="2025-05-14T00:48:23.922698740Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62 pid=2468 runtime=io.containerd.runc.v2 May 14 00:48:23.931860 systemd[1]: Started cri-containerd-7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62.scope. May 14 00:48:23.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit: BPF prog-id=100 op=LOAD May 14 00:48:23.946000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2468 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762363665643562666337333264323934653233306261303430313661 May 14 00:48:23.946000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.946000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2468 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762363665643562666337333264323934653233306261303430313661 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit: BPF prog-id=101 op=LOAD May 14 00:48:23.947000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2468 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762363665643562666337333264323934653233306261303430313661 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.947000 audit: BPF prog-id=102 op=LOAD May 14 00:48:23.947000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2468 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762363665643562666337333264323934653233306261303430313661 May 14 00:48:23.948000 audit: BPF prog-id=102 op=UNLOAD May 14 00:48:23.948000 audit: BPF prog-id=101 op=UNLOAD May 14 00:48:23.948000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:23.948000 audit: BPF prog-id=103 op=LOAD May 14 00:48:23.948000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2468 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:23.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762363665643562666337333264323934653233306261303430313661 May 14 00:48:23.950550 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:23.959506 env[1217]: time="2025-05-14T00:48:23.959462354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bl8sx,Uid:8996e0dd-449a-4bca-bc28-75021d9f9084,Namespace:calico-system,Attempt:1,} returns sandbox id \"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62\"" May 14 00:48:23.960819 env[1217]: time="2025-05-14T00:48:23.960791183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 14 00:48:24.103207 env[1217]: time="2025-05-14T00:48:24.103130361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-b4pwc,Uid:6ffe609e-d632-4d0d-a076-47570fa42b32,Namespace:calico-apiserver,Attempt:0,}" May 14 00:48:24.207748 systemd-networkd[1047]: cali4338193aa2e: Link UP May 14 00:48:24.209048 systemd-networkd[1047]: cali4338193aa2e: Gained carrier May 14 00:48:24.209177 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4338193aa2e: link becomes ready May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.143 [INFO][2500] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0 calico-apiserver-5c856d6799- calico-apiserver 6ffe609e-d632-4d0d-a076-47570fa42b32 1125 0 2025-05-14 00:48:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c856d6799 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.102 calico-apiserver-5c856d6799-b4pwc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4338193aa2e [] []}} ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.143 [INFO][2500] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.167 [INFO][2515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" HandleID="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Workload="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.178 [INFO][2515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" HandleID="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Workload="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002860b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.102", "pod":"calico-apiserver-5c856d6799-b4pwc", "timestamp":"2025-05-14 00:48:24.167095189 +0000 UTC"}, Hostname:"10.0.0.102", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.178 [INFO][2515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.178 [INFO][2515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.178 [INFO][2515] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.102' May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.180 [INFO][2515] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.185 [INFO][2515] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.189 [INFO][2515] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.192 [INFO][2515] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.194 [INFO][2515] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.194 [INFO][2515] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.195 [INFO][2515] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348 May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.199 [INFO][2515] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.203 [INFO][2515] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.194/26] block=192.168.54.192/26 handle="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.203 [INFO][2515] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.194/26] handle="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" host="10.0.0.102" May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.203 [INFO][2515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:24.219134 env[1217]: 2025-05-14 00:48:24.203 [INFO][2515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.194/26] IPv6=[] ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" HandleID="k8s-pod-network.10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Workload="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.205 [INFO][2500] cni-plugin/k8s.go 386: Populated endpoint ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ffe609e-d632-4d0d-a076-47570fa42b32", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"", Pod:"calico-apiserver-5c856d6799-b4pwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4338193aa2e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.205 [INFO][2500] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.194/32] ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.205 [INFO][2500] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4338193aa2e ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.209 [INFO][2500] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.209 [INFO][2500] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0", GenerateName:"calico-apiserver-5c856d6799-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ffe609e-d632-4d0d-a076-47570fa42b32", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c856d6799", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348", Pod:"calico-apiserver-5c856d6799-b4pwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4338193aa2e", MAC:"2a:1c:1f:d6:74:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:24.219659 env[1217]: 2025-05-14 00:48:24.216 [INFO][2500] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348" Namespace="calico-apiserver" Pod="calico-apiserver-5c856d6799-b4pwc" WorkloadEndpoint="10.0.0.102-k8s-calico--apiserver--5c856d6799--b4pwc-eth0" May 14 00:48:24.225000 audit[2537]: NETFILTER_CFG table=filter:86 family=2 entries=44 op=nft_register_chain pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:24.225000 audit[2537]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24680 a0=3 a1=fffffb8f8dc0 a2=0 a3=ffff89f85fa8 items=0 ppid=2143 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:24.232364 env[1217]: time="2025-05-14T00:48:24.232184078Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:24.232364 env[1217]: time="2025-05-14T00:48:24.232222939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:24.232364 env[1217]: time="2025-05-14T00:48:24.232233585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:24.232504 env[1217]: time="2025-05-14T00:48:24.232391472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348 pid=2545 runtime=io.containerd.runc.v2 May 14 00:48:24.242499 systemd[1]: Started cri-containerd-10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348.scope. May 14 00:48:24.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.257000 audit: BPF prog-id=104 op=LOAD May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643531633136323966373661373563323964663536373430353965 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643531633136323966373661373563323964663536373430353965 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit: BPF prog-id=105 op=LOAD May 14 00:48:24.258000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643531633136323966373661373563323964663536373430353965 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit: BPF prog-id=106 op=LOAD May 14 00:48:24.258000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643531633136323966373661373563323964663536373430353965 May 14 00:48:24.258000 audit: BPF prog-id=106 op=UNLOAD May 14 00:48:24.258000 audit: BPF prog-id=105 op=UNLOAD May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.258000 audit: BPF prog-id=107 op=LOAD May 14 00:48:24.258000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643531633136323966373661373563323964663536373430353965 May 14 00:48:24.260761 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:24.278277 env[1217]: time="2025-05-14T00:48:24.278220730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c856d6799-b4pwc,Uid:6ffe609e-d632-4d0d-a076-47570fa42b32,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348\"" May 14 00:48:24.431843 kubelet[1454]: E0514 00:48:24.431726 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:24.819000 audit[2577]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=2577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:24.819000 audit[2577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd48cfb60 a2=0 a3=1 items=0 ppid=1612 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:24.830000 audit[2577]: NETFILTER_CFG table=nat:88 family=2 entries=36 op=nft_register_rule pid=2577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:24.830000 audit[2577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd48cfb60 a2=0 a3=1 items=0 ppid=1612 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:24.836764 env[1217]: time="2025-05-14T00:48:24.836704090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:24.837850 env[1217]: time="2025-05-14T00:48:24.837812302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:24.839485 env[1217]: time="2025-05-14T00:48:24.839448005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:24.840654 env[1217]: time="2025-05-14T00:48:24.840605724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:24.841077 env[1217]: time="2025-05-14T00:48:24.841033120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 14 00:48:24.842716 env[1217]: time="2025-05-14T00:48:24.842681430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:48:24.843382 env[1217]: time="2025-05-14T00:48:24.843321903Z" level=info msg="CreateContainer within sandbox \"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 14 00:48:24.857186 env[1217]: time="2025-05-14T00:48:24.857068611Z" level=info msg="CreateContainer within sandbox \"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ea12c046e1449d74169b2fd262fdd2404ca2320806ac83be3ac2bd4b73063c5a\"" May 14 00:48:24.857770 env[1217]: time="2025-05-14T00:48:24.857696118Z" level=info msg="StartContainer for \"ea12c046e1449d74169b2fd262fdd2404ca2320806ac83be3ac2bd4b73063c5a\"" May 14 00:48:24.874787 systemd[1]: Started cri-containerd-ea12c046e1449d74169b2fd262fdd2404ca2320806ac83be3ac2bd4b73063c5a.scope. May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2468 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313263303436653134343964373431363962326664323632666464 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.900000 audit: BPF prog-id=108 op=LOAD May 14 00:48:24.900000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2468 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313263303436653134343964373431363962326664323632666464 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.901000 audit: BPF prog-id=109 op=LOAD May 14 00:48:24.901000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2468 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313263303436653134343964373431363962326664323632666464 May 14 00:48:24.901000 audit: BPF prog-id=109 op=UNLOAD May 14 00:48:24.901000 audit: BPF prog-id=108 op=UNLOAD May 14 00:48:24.902000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:24.902000 audit: BPF prog-id=110 op=LOAD May 14 00:48:24.902000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2468 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:24.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313263303436653134343964373431363962326664323632666464 May 14 00:48:24.924115 env[1217]: time="2025-05-14T00:48:24.924067034Z" level=info msg="StartContainer for \"ea12c046e1449d74169b2fd262fdd2404ca2320806ac83be3ac2bd4b73063c5a\" returns successfully" May 14 00:48:25.005647 systemd-networkd[1047]: cali1659ca1704e: Gained IPv6LL May 14 00:48:25.325342 systemd-networkd[1047]: cali4338193aa2e: Gained IPv6LL May 14 00:48:25.432444 kubelet[1454]: E0514 00:48:25.432392 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:25.640229 env[1217]: time="2025-05-14T00:48:25.638937444Z" level=info msg="StopPodSandbox for \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\"" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" iface="eth0" netns="/var/run/netns/cni-3ebba6ea-c339-98ca-ff2b-0a05b3940115" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" iface="eth0" netns="/var/run/netns/cni-3ebba6ea-c339-98ca-ff2b-0a05b3940115" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" iface="eth0" netns="/var/run/netns/cni-3ebba6ea-c339-98ca-ff2b-0a05b3940115" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.686 [INFO][2638] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.707 [INFO][2646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" HandleID="k8s-pod-network.a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.707 [INFO][2646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.707 [INFO][2646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.716 [WARNING][2646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" HandleID="k8s-pod-network.a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.716 [INFO][2646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" HandleID="k8s-pod-network.a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.718 [INFO][2646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:25.721275 env[1217]: 2025-05-14 00:48:25.720 [INFO][2638] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72" May 14 00:48:25.721800 env[1217]: time="2025-05-14T00:48:25.721463628Z" level=info msg="TearDown network for sandbox \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\" successfully" May 14 00:48:25.721800 env[1217]: time="2025-05-14T00:48:25.721495765Z" level=info msg="StopPodSandbox for \"a5c4bb8c5a12ceb3926f52990d4040b3ea65e26b1c8a9f1bc6ab5aac78af3b72\" returns successfully" May 14 00:48:25.722082 env[1217]: time="2025-05-14T00:48:25.722042650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-78dbw,Uid:31a33534-d292-4142-a6b2-6fca18000571,Namespace:default,Attempt:1,}" May 14 00:48:25.763992 systemd[1]: run-netns-cni\x2d3ebba6ea\x2dc339\x2d98ca\x2dff2b\x2d0a05b3940115.mount: Deactivated successfully. May 14 00:48:25.850508 systemd-networkd[1047]: cali880e3bc7b52: Link UP May 14 00:48:25.852382 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:25.852466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali880e3bc7b52: link becomes ready May 14 00:48:25.852393 systemd-networkd[1047]: cali880e3bc7b52: Gained carrier May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.774 [INFO][2655] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0 nginx-deployment-7fcdb87857- default 31a33534-d292-4142-a6b2-6fca18000571 1150 0 2025-05-14 00:48:11 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.102 nginx-deployment-7fcdb87857-78dbw eth0 default [] [] [kns.default ksa.default.default] cali880e3bc7b52 [] []}} ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.775 [INFO][2655] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.803 [INFO][2670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" HandleID="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.815 [INFO][2670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" HandleID="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d400), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.102", "pod":"nginx-deployment-7fcdb87857-78dbw", "timestamp":"2025-05-14 00:48:25.803093185 +0000 UTC"}, Hostname:"10.0.0.102", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.815 [INFO][2670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.815 [INFO][2670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.815 [INFO][2670] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.102' May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.818 [INFO][2670] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.822 [INFO][2670] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.829 [INFO][2670] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.831 [INFO][2670] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.833 [INFO][2670] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.833 [INFO][2670] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.835 [INFO][2670] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.840 [INFO][2670] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.846 [INFO][2670] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.195/26] block=192.168.54.192/26 handle="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.846 [INFO][2670] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.195/26] handle="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" host="10.0.0.102" May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.847 [INFO][2670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:25.862016 env[1217]: 2025-05-14 00:48:25.847 [INFO][2670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.195/26] IPv6=[] ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" HandleID="k8s-pod-network.c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Workload="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.848 [INFO][2655] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31a33534-d292-4142-a6b2-6fca18000571", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-78dbw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali880e3bc7b52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.848 [INFO][2655] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.195/32] ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.848 [INFO][2655] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali880e3bc7b52 ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.852 [INFO][2655] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.853 [INFO][2655] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31a33534-d292-4142-a6b2-6fca18000571", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d", Pod:"nginx-deployment-7fcdb87857-78dbw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali880e3bc7b52", MAC:"8e:99:9e:34:f6:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:25.862773 env[1217]: 2025-05-14 00:48:25.859 [INFO][2655] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d" Namespace="default" Pod="nginx-deployment-7fcdb87857-78dbw" WorkloadEndpoint="10.0.0.102-k8s-nginx--deployment--7fcdb87857--78dbw-eth0" May 14 00:48:25.872000 audit[2692]: NETFILTER_CFG table=filter:89 family=2 entries=42 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:25.872000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21500 a0=3 a1=ffffdaa79b00 a2=0 a3=ffffac6c1fa8 items=0 ppid=2143 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.872000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:25.877839 env[1217]: time="2025-05-14T00:48:25.877781484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:25.877966 env[1217]: time="2025-05-14T00:48:25.877944049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:25.878058 env[1217]: time="2025-05-14T00:48:25.878037217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:25.878340 env[1217]: time="2025-05-14T00:48:25.878291069Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d pid=2701 runtime=io.containerd.runc.v2 May 14 00:48:25.894105 systemd[1]: run-containerd-runc-k8s.io-c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d-runc.f2zJKN.mount: Deactivated successfully. May 14 00:48:25.899283 systemd[1]: Started cri-containerd-c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d.scope. May 14 00:48:25.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit: BPF prog-id=111 op=LOAD May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333039393233393639393361316633643961313132626165303136 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333039393233393639393361316633643961313132626165303136 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit: BPF prog-id=112 op=LOAD May 14 00:48:25.924000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333039393233393639393361316633643961313132626165303136 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit: BPF prog-id=113 op=LOAD May 14 00:48:25.924000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333039393233393639393361316633643961313132626165303136 May 14 00:48:25.924000 audit: BPF prog-id=113 op=UNLOAD May 14 00:48:25.924000 audit: BPF prog-id=112 op=UNLOAD May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:25.924000 audit: BPF prog-id=114 op=LOAD May 14 00:48:25.924000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333039393233393639393361316633643961313132626165303136 May 14 00:48:25.926373 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:25.942333 env[1217]: time="2025-05-14T00:48:25.942287154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-78dbw,Uid:31a33534-d292-4142-a6b2-6fca18000571,Namespace:default,Attempt:1,} returns sandbox id \"c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d\"" May 14 00:48:26.433170 kubelet[1454]: E0514 00:48:26.433100 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:26.545718 env[1217]: time="2025-05-14T00:48:26.545665755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:26.546826 env[1217]: time="2025-05-14T00:48:26.546762135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:26.548295 env[1217]: time="2025-05-14T00:48:26.548263875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:26.549990 env[1217]: time="2025-05-14T00:48:26.549954387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:26.550530 env[1217]: time="2025-05-14T00:48:26.550492292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:48:26.552016 env[1217]: time="2025-05-14T00:48:26.551721938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 14 00:48:26.552876 env[1217]: time="2025-05-14T00:48:26.552845412Z" level=info msg="CreateContainer within sandbox \"10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:48:26.563732 env[1217]: time="2025-05-14T00:48:26.563689273Z" level=info msg="CreateContainer within sandbox \"10d51c1629f76a75c29df5674059ea5a8652df324ea9eb2b43e7adb619353348\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"68a9f718f932748d64b8e6fb1ba457cdb67d82d6cdccd70f80b6cec89ffc06da\"" May 14 00:48:26.564225 env[1217]: time="2025-05-14T00:48:26.564196203Z" level=info msg="StartContainer for \"68a9f718f932748d64b8e6fb1ba457cdb67d82d6cdccd70f80b6cec89ffc06da\"" May 14 00:48:26.577107 systemd[1]: Started cri-containerd-68a9f718f932748d64b8e6fb1ba457cdb67d82d6cdccd70f80b6cec89ffc06da.scope. May 14 00:48:26.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.601000 audit: BPF prog-id=115 op=LOAD May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2545 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613966373138663933323734386436346238653666623162613435 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2545 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613966373138663933323734386436346238653666623162613435 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit: BPF prog-id=116 op=LOAD May 14 00:48:26.602000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2545 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613966373138663933323734386436346238653666623162613435 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit: BPF prog-id=117 op=LOAD May 14 00:48:26.602000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2545 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613966373138663933323734386436346238653666623162613435 May 14 00:48:26.602000 audit: BPF prog-id=117 op=UNLOAD May 14 00:48:26.602000 audit: BPF prog-id=116 op=UNLOAD May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:26.602000 audit: BPF prog-id=118 op=LOAD May 14 00:48:26.602000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2545 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613966373138663933323734386436346238653666623162613435 May 14 00:48:26.625175 env[1217]: time="2025-05-14T00:48:26.622795630Z" level=info msg="StartContainer for \"68a9f718f932748d64b8e6fb1ba457cdb67d82d6cdccd70f80b6cec89ffc06da\" returns successfully" May 14 00:48:26.719000 audit[2773]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.719000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdb870320 a2=0 a3=1 items=0 ppid=1612 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:26.725000 audit[2773]: NETFILTER_CFG table=nat:91 family=2 entries=36 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:26.725000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffdb870320 a2=0 a3=1 items=0 ppid=1612 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:26.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:27.434119 kubelet[1454]: E0514 00:48:27.434067 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:27.700120 kubelet[1454]: I0514 00:48:27.699556 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:27.757371 systemd-networkd[1047]: cali880e3bc7b52: Gained IPv6LL May 14 00:48:27.891171 env[1217]: time="2025-05-14T00:48:27.891100631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:27.896259 env[1217]: time="2025-05-14T00:48:27.896228579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:27.897864 env[1217]: time="2025-05-14T00:48:27.897838008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:27.899012 env[1217]: time="2025-05-14T00:48:27.898981861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:27.900057 env[1217]: time="2025-05-14T00:48:27.900020384Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 14 00:48:27.901137 env[1217]: time="2025-05-14T00:48:27.901106370Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 14 00:48:27.902320 env[1217]: time="2025-05-14T00:48:27.902267391Z" level=info msg="CreateContainer within sandbox \"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 14 00:48:27.916125 env[1217]: time="2025-05-14T00:48:27.916080743Z" level=info msg="CreateContainer within sandbox \"7b66ed5bfc732d294e230ba04016a929bf8e6c18179637e13dc3ea6a533aac62\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a5a35c4bc8e2e1171f9de806353f39673805473a8cf19170ad45cb937c26e3ca\"" May 14 00:48:27.917962 env[1217]: time="2025-05-14T00:48:27.917919239Z" level=info msg="StartContainer for \"a5a35c4bc8e2e1171f9de806353f39673805473a8cf19170ad45cb937c26e3ca\"" May 14 00:48:27.937059 systemd[1]: Started cri-containerd-a5a35c4bc8e2e1171f9de806353f39673805473a8cf19170ad45cb937c26e3ca.scope. May 14 00:48:27.961000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.961000 audit[2784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2468 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:27.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613335633462633865326531313731663964653830363335336633 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.962000 audit: BPF prog-id=119 op=LOAD May 14 00:48:27.962000 audit[2784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2468 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:27.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613335633462633865326531313731663964653830363335336633 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.963000 audit: BPF prog-id=120 op=LOAD May 14 00:48:27.963000 audit[2784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2468 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:27.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613335633462633865326531313731663964653830363335336633 May 14 00:48:27.964000 audit: BPF prog-id=120 op=UNLOAD May 14 00:48:27.964000 audit: BPF prog-id=119 op=UNLOAD May 14 00:48:27.964000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:27.964000 audit: BPF prog-id=121 op=LOAD May 14 00:48:27.964000 audit[2784]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2468 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:27.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613335633462633865326531313731663964653830363335336633 May 14 00:48:27.984112 env[1217]: time="2025-05-14T00:48:27.984052675Z" level=info msg="StartContainer for \"a5a35c4bc8e2e1171f9de806353f39673805473a8cf19170ad45cb937c26e3ca\" returns successfully" May 14 00:48:28.034000 audit[2751]: AVC avc: denied { watch } for pid=2751 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_48_23.1421324082/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c54,c455 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c54,c455 tclass=file permissive=0 May 14 00:48:28.034000 audit[2751]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400036b900 a2=fc6 a3=0 items=0 ppid=2545 pid=2751 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c54,c455 key=(null) May 14 00:48:28.034000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:48:28.435200 kubelet[1454]: E0514 00:48:28.435134 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:28.573383 kubelet[1454]: I0514 00:48:28.573357 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 14 00:48:28.573383 kubelet[1454]: I0514 00:48:28.573385 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 14 00:48:28.717608 kubelet[1454]: I0514 00:48:28.717340 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c856d6799-b4pwc" podStartSLOduration=3.445134953 podStartE2EDuration="5.717321004s" podCreationTimestamp="2025-05-14 00:48:23 +0000 UTC" firstStartedPulling="2025-05-14 00:48:24.279393017 +0000 UTC m=+25.761351707" lastFinishedPulling="2025-05-14 00:48:26.551579068 +0000 UTC m=+28.033537758" observedRunningTime="2025-05-14 00:48:26.707877021 +0000 UTC m=+28.189835711" watchObservedRunningTime="2025-05-14 00:48:28.717321004 +0000 UTC m=+30.199279694" May 14 00:48:29.436090 kubelet[1454]: E0514 00:48:29.436043 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:30.000652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4158025911.mount: Deactivated successfully. May 14 00:48:30.436820 kubelet[1454]: E0514 00:48:30.436772 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:31.269184 env[1217]: time="2025-05-14T00:48:31.269112890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:31.270690 env[1217]: time="2025-05-14T00:48:31.270655587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:31.272423 env[1217]: time="2025-05-14T00:48:31.272393917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:31.278168 env[1217]: time="2025-05-14T00:48:31.277170021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:31.278168 env[1217]: time="2025-05-14T00:48:31.277854757Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 14 00:48:31.281399 env[1217]: time="2025-05-14T00:48:31.281145427Z" level=info msg="CreateContainer within sandbox \"c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 14 00:48:31.294615 env[1217]: time="2025-05-14T00:48:31.294557959Z" level=info msg="CreateContainer within sandbox \"c730992396993a1f3d9a112bae016e545673725b28ea9f2c7389137ad290887d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4de37c18d65933e608b6bd304482d16504d70c238179307c89673d6a7d55c80f\"" May 14 00:48:31.295380 env[1217]: time="2025-05-14T00:48:31.295332289Z" level=info msg="StartContainer for \"4de37c18d65933e608b6bd304482d16504d70c238179307c89673d6a7d55c80f\"" May 14 00:48:31.317099 systemd[1]: run-containerd-runc-k8s.io-4de37c18d65933e608b6bd304482d16504d70c238179307c89673d6a7d55c80f-runc.fItgBQ.mount: Deactivated successfully. May 14 00:48:31.320695 systemd[1]: Started cri-containerd-4de37c18d65933e608b6bd304482d16504d70c238179307c89673d6a7d55c80f.scope. May 14 00:48:31.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.368005 kernel: kauditd_printk_skb: 340 callbacks suppressed May 14 00:48:31.368072 kernel: audit: type=1400 audit(1747183711.364:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.368098 kernel: audit: type=1400 audit(1747183711.364:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.371642 kernel: audit: type=1400 audit(1747183711.364:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.371699 kernel: audit: type=1400 audit(1747183711.364:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.375501 kernel: audit: type=1400 audit(1747183711.364:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.375544 kernel: audit: type=1400 audit(1747183711.364:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.377797 kernel: audit: type=1400 audit(1747183711.364:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.379369 kernel: audit: type=1400 audit(1747183711.364:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.383097 kernel: audit: type=1400 audit(1747183711.364:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.385577 kernel: audit: type=1400 audit(1747183711.364:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.364000 audit: BPF prog-id=122 op=LOAD May 14 00:48:31.368000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.368000 audit[2825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2701 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653337633138643635393333653630386236626433303434383264 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2701 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653337633138643635393333653630386236626433303434383264 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.369000 audit: BPF prog-id=123 op=LOAD May 14 00:48:31.369000 audit[2825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2701 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653337633138643635393333653630386236626433303434383264 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.370000 audit: BPF prog-id=124 op=LOAD May 14 00:48:31.370000 audit[2825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2701 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653337633138643635393333653630386236626433303434383264 May 14 00:48:31.372000 audit: BPF prog-id=124 op=UNLOAD May 14 00:48:31.372000 audit: BPF prog-id=123 op=UNLOAD May 14 00:48:31.372000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:31.372000 audit: BPF prog-id=125 op=LOAD May 14 00:48:31.372000 audit[2825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2701 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:31.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653337633138643635393333653630386236626433303434383264 May 14 00:48:31.417007 env[1217]: time="2025-05-14T00:48:31.416885634Z" level=info msg="StartContainer for \"4de37c18d65933e608b6bd304482d16504d70c238179307c89673d6a7d55c80f\" returns successfully" May 14 00:48:31.442365 kubelet[1454]: E0514 00:48:31.442316 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:31.723737 kubelet[1454]: I0514 00:48:31.723238 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bl8sx" podStartSLOduration=28.783016685 podStartE2EDuration="32.723223475s" podCreationTimestamp="2025-05-14 00:47:59 +0000 UTC" firstStartedPulling="2025-05-14 00:48:23.960586474 +0000 UTC m=+25.442545164" lastFinishedPulling="2025-05-14 00:48:27.900793264 +0000 UTC m=+29.382751954" observedRunningTime="2025-05-14 00:48:28.717486277 +0000 UTC m=+30.199444967" watchObservedRunningTime="2025-05-14 00:48:31.723223475 +0000 UTC m=+33.205182165" May 14 00:48:32.443484 kubelet[1454]: E0514 00:48:32.443423 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:33.221000 audit[2880]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.221000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc32722b0 a2=0 a3=1 items=0 ppid=1612 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.230000 audit[2880]: NETFILTER_CFG table=nat:93 family=2 entries=22 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.230000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc32722b0 a2=0 a3=1 items=0 ppid=1612 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.244000 audit[2882]: NETFILTER_CFG table=filter:94 family=2 entries=32 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.244000 audit[2882]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe9a08300 a2=0 a3=1 items=0 ppid=1612 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.255000 audit[2882]: NETFILTER_CFG table=nat:95 family=2 entries=22 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:33.255000 audit[2882]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe9a08300 a2=0 a3=1 items=0 ppid=1612 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:33.271892 kubelet[1454]: I0514 00:48:33.271832 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-78dbw" podStartSLOduration=16.934848422 podStartE2EDuration="22.271811101s" podCreationTimestamp="2025-05-14 00:48:11 +0000 UTC" firstStartedPulling="2025-05-14 00:48:25.943136877 +0000 UTC m=+27.425095527" lastFinishedPulling="2025-05-14 00:48:31.280099516 +0000 UTC m=+32.762058206" observedRunningTime="2025-05-14 00:48:31.723511782 +0000 UTC m=+33.205470472" watchObservedRunningTime="2025-05-14 00:48:33.271811101 +0000 UTC m=+34.753769791" May 14 00:48:33.277694 systemd[1]: Created slice kubepods-besteffort-pod3777bd88_09e0_4416_bba9_42422b1034e3.slice. May 14 00:48:33.443764 kubelet[1454]: E0514 00:48:33.443724 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:33.460167 kubelet[1454]: I0514 00:48:33.460086 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mqmxk\" (UniqueName: \"kubernetes.io/projected/3777bd88-09e0-4416-bba9-42422b1034e3-kube-api-access-mqmxk\") pod \"nfs-server-provisioner-0\" (UID: \"3777bd88-09e0-4416-bba9-42422b1034e3\") " pod="default/nfs-server-provisioner-0" May 14 00:48:33.460167 kubelet[1454]: I0514 00:48:33.460126 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/3777bd88-09e0-4416-bba9-42422b1034e3-data\") pod \"nfs-server-provisioner-0\" (UID: \"3777bd88-09e0-4416-bba9-42422b1034e3\") " pod="default/nfs-server-provisioner-0" May 14 00:48:33.581811 env[1217]: time="2025-05-14T00:48:33.581759570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3777bd88-09e0-4416-bba9-42422b1034e3,Namespace:default,Attempt:0,}" May 14 00:48:33.716287 systemd-networkd[1047]: cali60e51b789ff: Link UP May 14 00:48:33.718247 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:33.718415 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 14 00:48:33.718533 systemd-networkd[1047]: cali60e51b789ff: Gained carrier May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.633 [INFO][2884] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.102-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 3777bd88-09e0-4416-bba9-42422b1034e3 1212 0 2025-05-14 00:48:33 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.102 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.633 [INFO][2884] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.663 [INFO][2899] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" HandleID="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Workload="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.680 [INFO][2899] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" HandleID="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Workload="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000279410), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.102", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-14 00:48:33.663044994 +0000 UTC"}, Hostname:"10.0.0.102", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.680 [INFO][2899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.680 [INFO][2899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.680 [INFO][2899] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.102' May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.684 [INFO][2899] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.688 [INFO][2899] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.693 [INFO][2899] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.695 [INFO][2899] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.697 [INFO][2899] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.697 [INFO][2899] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.699 [INFO][2899] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2 May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.703 [INFO][2899] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.712 [INFO][2899] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.196/26] block=192.168.54.192/26 handle="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.712 [INFO][2899] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.196/26] handle="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" host="10.0.0.102" May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.712 [INFO][2899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:33.729339 env[1217]: 2025-05-14 00:48:33.712 [INFO][2899] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.196/26] IPv6=[] ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" HandleID="k8s-pod-network.df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Workload="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.729910 env[1217]: 2025-05-14 00:48:33.714 [INFO][2884] cni-plugin/k8s.go 386: Populated endpoint ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3777bd88-09e0-4416-bba9-42422b1034e3", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:33.729910 env[1217]: 2025-05-14 00:48:33.714 [INFO][2884] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.196/32] ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.729910 env[1217]: 2025-05-14 00:48:33.714 [INFO][2884] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.729910 env[1217]: 2025-05-14 00:48:33.718 [INFO][2884] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.730050 env[1217]: 2025-05-14 00:48:33.719 [INFO][2884] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3777bd88-09e0-4416-bba9-42422b1034e3", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ee:50:23:f7:53:98", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:33.730050 env[1217]: 2025-05-14 00:48:33.727 [INFO][2884] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.102-k8s-nfs--server--provisioner--0-eth0" May 14 00:48:33.735000 audit[2924]: NETFILTER_CFG table=filter:96 family=2 entries=42 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:33.735000 audit[2924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21008 a0=3 a1=ffffd3523de0 a2=0 a3=ffffbb582fa8 items=0 ppid=2143 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.735000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:33.773936 env[1217]: time="2025-05-14T00:48:33.773872780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:33.773936 env[1217]: time="2025-05-14T00:48:33.773909913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:33.774256 env[1217]: time="2025-05-14T00:48:33.773920596Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:33.774563 env[1217]: time="2025-05-14T00:48:33.774260270Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2 pid=2933 runtime=io.containerd.runc.v2 May 14 00:48:33.791153 systemd[1]: Started cri-containerd-df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2.scope. May 14 00:48:33.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit: BPF prog-id=126 op=LOAD May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2933 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306231643939633461313837366463393038323832656331353637 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2933 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306231643939633461313837366463393038323832656331353637 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit: BPF prog-id=127 op=LOAD May 14 00:48:33.809000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2933 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306231643939633461313837366463393038323832656331353637 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit: BPF prog-id=128 op=LOAD May 14 00:48:33.809000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2933 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306231643939633461313837366463393038323832656331353637 May 14 00:48:33.809000 audit: BPF prog-id=128 op=UNLOAD May 14 00:48:33.809000 audit: BPF prog-id=127 op=UNLOAD May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:33.809000 audit: BPF prog-id=129 op=LOAD May 14 00:48:33.809000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2933 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:33.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306231643939633461313837366463393038323832656331353637 May 14 00:48:33.811686 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:33.826925 env[1217]: time="2025-05-14T00:48:33.826891709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3777bd88-09e0-4416-bba9-42422b1034e3,Namespace:default,Attempt:0,} returns sandbox id \"df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2\"" May 14 00:48:33.829098 env[1217]: time="2025-05-14T00:48:33.829077603Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 14 00:48:34.445171 kubelet[1454]: E0514 00:48:34.445122 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:34.925350 systemd-networkd[1047]: cali60e51b789ff: Gained IPv6LL May 14 00:48:35.077337 systemd[1]: Created slice kubepods-besteffort-podd472c661_5e39_4c0b_94a4_21d86b9df296.slice. May 14 00:48:35.091000 audit[2974]: NETFILTER_CFG table=filter:97 family=2 entries=32 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:35.091000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff1e39ca0 a2=0 a3=1 items=0 ppid=1612 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:35.102000 audit[2974]: NETFILTER_CFG table=nat:98 family=2 entries=30 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:35.102000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff1e39ca0 a2=0 a3=1 items=0 ppid=1612 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:35.214020 env[1217]: time="2025-05-14T00:48:35.213909855Z" level=info msg="StopContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" with timeout 5 (s)" May 14 00:48:35.214713 env[1217]: time="2025-05-14T00:48:35.214305775Z" level=info msg="Stop container \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" with signal terminated" May 14 00:48:35.227074 systemd[1]: cri-containerd-9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9.scope: Deactivated successfully. May 14 00:48:35.227389 systemd[1]: cri-containerd-9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9.scope: Consumed 1.535s CPU time. May 14 00:48:35.245422 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9-rootfs.mount: Deactivated successfully. May 14 00:48:35.246389 env[1217]: time="2025-05-14T00:48:35.246338750Z" level=info msg="shim disconnected" id=9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9 May 14 00:48:35.246470 env[1217]: time="2025-05-14T00:48:35.246391406Z" level=warning msg="cleaning up after shim disconnected" id=9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9 namespace=k8s.io May 14 00:48:35.246470 env[1217]: time="2025-05-14T00:48:35.246405050Z" level=info msg="cleaning up dead shim" May 14 00:48:35.253257 env[1217]: time="2025-05-14T00:48:35.253213271Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3015 runtime=io.containerd.runc.v2\n" May 14 00:48:35.269589 kubelet[1454]: I0514 00:48:35.269485 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d472c661-5e39-4c0b-94a4-21d86b9df296-tigera-ca-bundle\") pod \"calico-typha-fbdc8b97c-kk5mj\" (UID: \"d472c661-5e39-4c0b-94a4-21d86b9df296\") " pod="calico-system/calico-typha-fbdc8b97c-kk5mj" May 14 00:48:35.269589 kubelet[1454]: I0514 00:48:35.269532 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d472c661-5e39-4c0b-94a4-21d86b9df296-typha-certs\") pod \"calico-typha-fbdc8b97c-kk5mj\" (UID: \"d472c661-5e39-4c0b-94a4-21d86b9df296\") " pod="calico-system/calico-typha-fbdc8b97c-kk5mj" May 14 00:48:35.269589 kubelet[1454]: I0514 00:48:35.269555 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjmbw\" (UniqueName: \"kubernetes.io/projected/d472c661-5e39-4c0b-94a4-21d86b9df296-kube-api-access-tjmbw\") pod \"calico-typha-fbdc8b97c-kk5mj\" (UID: \"d472c661-5e39-4c0b-94a4-21d86b9df296\") " pod="calico-system/calico-typha-fbdc8b97c-kk5mj" May 14 00:48:35.294634 env[1217]: time="2025-05-14T00:48:35.294581992Z" level=info msg="StopContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" returns successfully" May 14 00:48:35.295142 env[1217]: time="2025-05-14T00:48:35.295114433Z" level=info msg="StopPodSandbox for \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\"" May 14 00:48:35.295220 env[1217]: time="2025-05-14T00:48:35.295187615Z" level=info msg="Container to stop \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:35.295220 env[1217]: time="2025-05-14T00:48:35.295204420Z" level=info msg="Container to stop \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:35.295270 env[1217]: time="2025-05-14T00:48:35.295215743Z" level=info msg="Container to stop \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 14 00:48:35.297036 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc-shm.mount: Deactivated successfully. May 14 00:48:35.300423 systemd[1]: cri-containerd-be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc.scope: Deactivated successfully. May 14 00:48:35.299000 audit: BPF prog-id=61 op=UNLOAD May 14 00:48:35.306000 audit: BPF prog-id=65 op=UNLOAD May 14 00:48:35.317860 env[1217]: time="2025-05-14T00:48:35.317809622Z" level=info msg="shim disconnected" id=be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc May 14 00:48:35.317860 env[1217]: time="2025-05-14T00:48:35.317856396Z" level=warning msg="cleaning up after shim disconnected" id=be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc namespace=k8s.io May 14 00:48:35.318008 env[1217]: time="2025-05-14T00:48:35.317866599Z" level=info msg="cleaning up dead shim" May 14 00:48:35.324269 env[1217]: time="2025-05-14T00:48:35.324224803Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3045 runtime=io.containerd.runc.v2\n" May 14 00:48:35.336710 env[1217]: time="2025-05-14T00:48:35.336653205Z" level=info msg="TearDown network for sandbox \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" successfully" May 14 00:48:35.336710 env[1217]: time="2025-05-14T00:48:35.336698338Z" level=info msg="StopPodSandbox for \"be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc\" returns successfully" May 14 00:48:35.383314 kubelet[1454]: I0514 00:48:35.383270 1454 memory_manager.go:355] "RemoveStaleState removing state" podUID="1d8ebd55-c963-455a-b911-c3d19b7f78db" containerName="calico-node" May 14 00:48:35.387962 systemd[1]: Created slice kubepods-besteffort-pod3ac37a51_dd0e_4a9e_9b2c_296d942e1f22.slice. May 14 00:48:35.445401 kubelet[1454]: E0514 00:48:35.445341 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470614 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-log-dir\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470676 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1d8ebd55-c963-455a-b911-c3d19b7f78db-node-certs\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470699 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-flexvol-driver-host\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470722 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-bin-dir\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470736 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-run-calico\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.470795 kubelet[1454]: I0514 00:48:35.470751 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-net-dir\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470765 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-lib-modules\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470781 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-policysync\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470801 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-rpv9x\" (UniqueName: \"kubernetes.io/projected/1d8ebd55-c963-455a-b911-c3d19b7f78db-kube-api-access-rpv9x\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470820 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1d8ebd55-c963-455a-b911-c3d19b7f78db-tigera-ca-bundle\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470836 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-lib-calico\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471309 kubelet[1454]: I0514 00:48:35.470853 1454 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-xtables-lock\") pod \"1d8ebd55-c963-455a-b911-c3d19b7f78db\" (UID: \"1d8ebd55-c963-455a-b911-c3d19b7f78db\") " May 14 00:48:35.471481 kubelet[1454]: I0514 00:48:35.470924 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.471481 kubelet[1454]: I0514 00:48:35.470959 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.471481 kubelet[1454]: I0514 00:48:35.471261 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.471481 kubelet[1454]: I0514 00:48:35.471291 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.471481 kubelet[1454]: I0514 00:48:35.471312 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.471719 kubelet[1454]: I0514 00:48:35.471331 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.472310 kubelet[1454]: I0514 00:48:35.472275 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.472449 kubelet[1454]: I0514 00:48:35.472350 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-policysync" (OuterVolumeSpecName: "policysync") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.472449 kubelet[1454]: I0514 00:48:35.472377 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 14 00:48:35.479355 kubelet[1454]: I0514 00:48:35.479308 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1d8ebd55-c963-455a-b911-c3d19b7f78db-kube-api-access-rpv9x" (OuterVolumeSpecName: "kube-api-access-rpv9x") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "kube-api-access-rpv9x". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 14 00:48:35.479656 kubelet[1454]: I0514 00:48:35.479609 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1d8ebd55-c963-455a-b911-c3d19b7f78db-node-certs" (OuterVolumeSpecName: "node-certs") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 14 00:48:35.481942 kubelet[1454]: I0514 00:48:35.481905 1454 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1d8ebd55-c963-455a-b911-c3d19b7f78db-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1d8ebd55-c963-455a-b911-c3d19b7f78db" (UID: "1d8ebd55-c963-455a-b911-c3d19b7f78db"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 14 00:48:35.572010 kubelet[1454]: I0514 00:48:35.571971 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-policysync\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572216 kubelet[1454]: I0514 00:48:35.572196 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-var-lib-calico\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572329 kubelet[1454]: I0514 00:48:35.572314 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-cni-net-dir\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572428 kubelet[1454]: I0514 00:48:35.572414 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-node-certs\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572499 kubelet[1454]: I0514 00:48:35.572487 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-xtables-lock\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572579 kubelet[1454]: I0514 00:48:35.572567 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-tigera-ca-bundle\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572650 kubelet[1454]: I0514 00:48:35.572638 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-var-run-calico\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572728 kubelet[1454]: I0514 00:48:35.572716 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-lib-modules\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572803 kubelet[1454]: I0514 00:48:35.572787 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-cni-bin-dir\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572875 kubelet[1454]: I0514 00:48:35.572861 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-flexvol-driver-host\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.572947 kubelet[1454]: I0514 00:48:35.572935 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l6q6w\" (UniqueName: \"kubernetes.io/projected/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-kube-api-access-l6q6w\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.573019 kubelet[1454]: I0514 00:48:35.573007 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3ac37a51-dd0e-4a9e-9b2c-296d942e1f22-cni-log-dir\") pod \"calico-node-g6lqc\" (UID: \"3ac37a51-dd0e-4a9e-9b2c-296d942e1f22\") " pod="calico-system/calico-node-g6lqc" May 14 00:48:35.573114 kubelet[1454]: I0514 00:48:35.573101 1454 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1d8ebd55-c963-455a-b911-c3d19b7f78db-node-certs\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573203 kubelet[1454]: I0514 00:48:35.573191 1454 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-log-dir\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573277 kubelet[1454]: I0514 00:48:35.573266 1454 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-run-calico\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573343 kubelet[1454]: I0514 00:48:35.573331 1454 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-flexvol-driver-host\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573406 kubelet[1454]: I0514 00:48:35.573394 1454 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-bin-dir\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573464 kubelet[1454]: I0514 00:48:35.573454 1454 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-cni-net-dir\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573518 kubelet[1454]: I0514 00:48:35.573508 1454 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-lib-modules\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573569 kubelet[1454]: I0514 00:48:35.573561 1454 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-policysync\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573624 kubelet[1454]: I0514 00:48:35.573615 1454 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1d8ebd55-c963-455a-b911-c3d19b7f78db-tigera-ca-bundle\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573678 kubelet[1454]: I0514 00:48:35.573668 1454 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-rpv9x\" (UniqueName: \"kubernetes.io/projected/1d8ebd55-c963-455a-b911-c3d19b7f78db-kube-api-access-rpv9x\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573734 kubelet[1454]: I0514 00:48:35.573725 1454 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-xtables-lock\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.573789 kubelet[1454]: I0514 00:48:35.573779 1454 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d8ebd55-c963-455a-b911-c3d19b7f78db-var-lib-calico\") on node \"10.0.0.102\" DevicePath \"\"" May 14 00:48:35.575981 systemd[1]: var-lib-kubelet-pods-1d8ebd55\x2dc963\x2d455a\x2db911\x2dc3d19b7f78db-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 14 00:48:35.576105 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-be5f97338c785526461db1b6851d6e8a993de85d87cc0e93be11e9b958d7e4fc-rootfs.mount: Deactivated successfully. May 14 00:48:35.576174 systemd[1]: var-lib-kubelet-pods-1d8ebd55\x2dc963\x2d455a\x2db911\x2dc3d19b7f78db-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2drpv9x.mount: Deactivated successfully. May 14 00:48:35.576232 systemd[1]: var-lib-kubelet-pods-1d8ebd55\x2dc963\x2d455a\x2db911\x2dc3d19b7f78db-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 14 00:48:35.640474 systemd[1]: Removed slice kubepods-besteffort-pod1d8ebd55_c963_455a_b911_c3d19b7f78db.slice. May 14 00:48:35.640555 systemd[1]: kubepods-besteffort-pod1d8ebd55_c963_455a_b911_c3d19b7f78db.slice: Consumed 2.090s CPU time. May 14 00:48:35.680466 kubelet[1454]: E0514 00:48:35.680423 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:35.681253 env[1217]: time="2025-05-14T00:48:35.680854740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fbdc8b97c-kk5mj,Uid:d472c661-5e39-4c0b-94a4-21d86b9df296,Namespace:calico-system,Attempt:0,}" May 14 00:48:35.705819 env[1217]: time="2025-05-14T00:48:35.705744033Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:35.705819 env[1217]: time="2025-05-14T00:48:35.705786966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:35.705819 env[1217]: time="2025-05-14T00:48:35.705797089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:35.706180 env[1217]: time="2025-05-14T00:48:35.706132071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24014f9447fc542f2d802d6533f04ff7b3bb1cdb6885b73ef7369090795608fc pid=3072 runtime=io.containerd.runc.v2 May 14 00:48:35.725554 kubelet[1454]: I0514 00:48:35.725449 1454 scope.go:117] "RemoveContainer" containerID="9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9" May 14 00:48:35.727384 systemd[1]: Started cri-containerd-24014f9447fc542f2d802d6533f04ff7b3bb1cdb6885b73ef7369090795608fc.scope. May 14 00:48:35.731973 env[1217]: time="2025-05-14T00:48:35.728508483Z" level=info msg="RemoveContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\"" May 14 00:48:35.738276 env[1217]: time="2025-05-14T00:48:35.738221303Z" level=info msg="RemoveContainer for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" returns successfully" May 14 00:48:35.738635 kubelet[1454]: I0514 00:48:35.738529 1454 scope.go:117] "RemoveContainer" containerID="72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142" May 14 00:48:35.742280 env[1217]: time="2025-05-14T00:48:35.741630054Z" level=info msg="RemoveContainer for \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\"" May 14 00:48:35.744427 env[1217]: time="2025-05-14T00:48:35.744394251Z" level=info msg="RemoveContainer for \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\" returns successfully" May 14 00:48:35.744703 kubelet[1454]: I0514 00:48:35.744597 1454 scope.go:117] "RemoveContainer" containerID="d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121" May 14 00:48:35.746284 env[1217]: time="2025-05-14T00:48:35.746253774Z" level=info msg="RemoveContainer for \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\"" May 14 00:48:35.748904 env[1217]: time="2025-05-14T00:48:35.748873767Z" level=info msg="RemoveContainer for \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\" returns successfully" May 14 00:48:35.749093 kubelet[1454]: I0514 00:48:35.749070 1454 scope.go:117] "RemoveContainer" containerID="9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9" May 14 00:48:35.749417 env[1217]: time="2025-05-14T00:48:35.749316421Z" level=error msg="ContainerStatus for \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\": not found" May 14 00:48:35.749708 kubelet[1454]: E0514 00:48:35.749626 1454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\": not found" containerID="9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9" May 14 00:48:35.749708 kubelet[1454]: I0514 00:48:35.749657 1454 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9"} err="failed to get container status \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\": rpc error: code = NotFound desc = an error occurred when try to find container \"9f29ef45e50d50b21dbce95d7604547a544da78a145423bc48ed582f84ed81e9\": not found" May 14 00:48:35.749708 kubelet[1454]: I0514 00:48:35.749678 1454 scope.go:117] "RemoveContainer" containerID="72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142" May 14 00:48:35.749987 env[1217]: time="2025-05-14T00:48:35.749938929Z" level=error msg="ContainerStatus for \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\": not found" May 14 00:48:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.751000 audit: BPF prog-id=130 op=LOAD May 14 00:48:35.752172 kubelet[1454]: E0514 00:48:35.750604 1454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\": not found" containerID="72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142" May 14 00:48:35.752172 kubelet[1454]: I0514 00:48:35.750630 1454 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142"} err="failed to get container status \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\": rpc error: code = NotFound desc = an error occurred when try to find container \"72bcc6fdd5ee5da12f7b92c9308ff19c375d0f66add7305401ba1058054c5142\": not found" May 14 00:48:35.752172 kubelet[1454]: I0514 00:48:35.750646 1454 scope.go:117] "RemoveContainer" containerID="d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121" May 14 00:48:35.752455 env[1217]: time="2025-05-14T00:48:35.752405356Z" level=error msg="ContainerStatus for \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\": not found" May 14 00:48:35.752681 kubelet[1454]: E0514 00:48:35.752649 1454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\": not found" containerID="d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121" May 14 00:48:35.752739 kubelet[1454]: I0514 00:48:35.752679 1454 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121"} err="failed to get container status \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\": rpc error: code = NotFound desc = an error occurred when try to find container \"d869d2d52d1cee64f3b426f89fb5d581712961e65b6bb121665f20bb44024121\": not found" May 14 00:48:35.752000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.752000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303134663934343766633534326632643830326436353333663034 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303134663934343766633534326632643830326436353333663034 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit: BPF prog-id=131 op=LOAD May 14 00:48:35.753000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303134663934343766633534326632643830326436353333663034 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.753000 audit: BPF prog-id=132 op=LOAD May 14 00:48:35.753000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303134663934343766633534326632643830326436353333663034 May 14 00:48:35.754000 audit: BPF prog-id=132 op=UNLOAD May 14 00:48:35.754000 audit: BPF prog-id=131 op=UNLOAD May 14 00:48:35.754000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:35.754000 audit: BPF prog-id=133 op=LOAD May 14 00:48:35.754000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:35.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303134663934343766633534326632643830326436353333663034 May 14 00:48:35.771650 env[1217]: time="2025-05-14T00:48:35.771607167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fbdc8b97c-kk5mj,Uid:d472c661-5e39-4c0b-94a4-21d86b9df296,Namespace:calico-system,Attempt:0,} returns sandbox id \"24014f9447fc542f2d802d6533f04ff7b3bb1cdb6885b73ef7369090795608fc\"" May 14 00:48:35.772895 kubelet[1454]: E0514 00:48:35.772386 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:35.990906 kubelet[1454]: E0514 00:48:35.990600 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:35.991016 update_engine[1209]: I0514 00:48:35.990715 1209 update_attempter.cc:509] Updating boot flags... May 14 00:48:35.993816 env[1217]: time="2025-05-14T00:48:35.993771807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g6lqc,Uid:3ac37a51-dd0e-4a9e-9b2c-296d942e1f22,Namespace:calico-system,Attempt:0,}" May 14 00:48:36.025049 env[1217]: time="2025-05-14T00:48:36.024883345Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:36.025049 env[1217]: time="2025-05-14T00:48:36.024939962Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:36.025049 env[1217]: time="2025-05-14T00:48:36.024950285Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:36.026031 env[1217]: time="2025-05-14T00:48:36.025354521Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b pid=3122 runtime=io.containerd.runc.v2 May 14 00:48:36.075185 systemd[1]: Started cri-containerd-40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b.scope. May 14 00:48:36.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit: BPF prog-id=134 op=LOAD May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3122 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643832343234366139303236326431643665303537376364623936 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3122 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643832343234366139303236326431643665303537376364623936 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit: BPF prog-id=135 op=LOAD May 14 00:48:36.090000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3122 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643832343234366139303236326431643665303537376364623936 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit: BPF prog-id=136 op=LOAD May 14 00:48:36.090000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3122 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643832343234366139303236326431643665303537376364623936 May 14 00:48:36.090000 audit: BPF prog-id=136 op=UNLOAD May 14 00:48:36.090000 audit: BPF prog-id=135 op=UNLOAD May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.090000 audit: BPF prog-id=137 op=LOAD May 14 00:48:36.090000 audit[3135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3122 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643832343234366139303236326431643665303537376364623936 May 14 00:48:36.102960 env[1217]: time="2025-05-14T00:48:36.102903223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g6lqc,Uid:3ac37a51-dd0e-4a9e-9b2c-296d942e1f22,Namespace:calico-system,Attempt:0,} returns sandbox id \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\"" May 14 00:48:36.104178 kubelet[1454]: E0514 00:48:36.103695 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:36.105807 env[1217]: time="2025-05-14T00:48:36.105773528Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 14 00:48:36.116865 env[1217]: time="2025-05-14T00:48:36.116808861Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41\"" May 14 00:48:36.117292 env[1217]: time="2025-05-14T00:48:36.117210817Z" level=info msg="StartContainer for \"73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41\"" May 14 00:48:36.125000 audit[3167]: NETFILTER_CFG table=filter:99 family=2 entries=32 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:36.125000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcefa7c60 a2=0 a3=1 items=0 ppid=1612 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:36.136416 systemd[1]: Started cri-containerd-73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41.scope. May 14 00:48:36.141000 audit[3167]: NETFILTER_CFG table=nat:100 family=2 entries=30 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:36.141000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcefa7c60 a2=0 a3=1 items=0 ppid=1612 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3122 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663235373532393038303862316433333761653233346431646563 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit: BPF prog-id=138 op=LOAD May 14 00:48:36.163000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3122 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663235373532393038303862316433333761653233346431646563 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit: BPF prog-id=139 op=LOAD May 14 00:48:36.163000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3122 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663235373532393038303862316433333761653233346431646563 May 14 00:48:36.163000 audit: BPF prog-id=139 op=UNLOAD May 14 00:48:36.163000 audit: BPF prog-id=138 op=UNLOAD May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:36.163000 audit: BPF prog-id=140 op=LOAD May 14 00:48:36.163000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3122 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663235373532393038303862316433333761653233346431646563 May 14 00:48:36.176131 env[1217]: time="2025-05-14T00:48:36.176084708Z" level=info msg="StartContainer for \"73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41\" returns successfully" May 14 00:48:36.202090 systemd[1]: cri-containerd-73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41.scope: Deactivated successfully. May 14 00:48:36.208000 audit: BPF prog-id=140 op=UNLOAD May 14 00:48:36.350172 env[1217]: time="2025-05-14T00:48:36.350109994Z" level=info msg="shim disconnected" id=73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41 May 14 00:48:36.350631 env[1217]: time="2025-05-14T00:48:36.350605817Z" level=warning msg="cleaning up after shim disconnected" id=73f2575290808b1d337ae234d1dec2328bcc031516c2a4c177e17ddb8e207a41 namespace=k8s.io May 14 00:48:36.350698 env[1217]: time="2025-05-14T00:48:36.350684880Z" level=info msg="cleaning up dead shim" May 14 00:48:36.356715 env[1217]: time="2025-05-14T00:48:36.356681684Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3205 runtime=io.containerd.runc.v2\n" May 14 00:48:36.445887 kubelet[1454]: E0514 00:48:36.445833 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:36.575646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4083261676.mount: Deactivated successfully. May 14 00:48:36.728724 kubelet[1454]: E0514 00:48:36.728614 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:36.730353 env[1217]: time="2025-05-14T00:48:36.730314614Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 14 00:48:36.952214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3141265629.mount: Deactivated successfully. May 14 00:48:36.961482 env[1217]: time="2025-05-14T00:48:36.961420796Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d\"" May 14 00:48:36.961930 env[1217]: time="2025-05-14T00:48:36.961893531Z" level=info msg="StartContainer for \"c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d\"" May 14 00:48:36.979698 systemd[1]: Started cri-containerd-c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d.scope. May 14 00:48:37.019377 kernel: kauditd_printk_skb: 291 callbacks suppressed May 14 00:48:37.019503 kernel: audit: type=1400 audit(1747183717.015:837): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.019539 kernel: audit: type=1300 audit(1747183717.015:837): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3122 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3122 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316561653266366264656236313233613739383034616663396536 May 14 00:48:37.024151 kernel: audit: type=1327 audit(1747183717.015:837): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316561653266366264656236313233613739383034616663396536 May 14 00:48:37.024225 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.028115 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.028186 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.029861 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.033688 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.033748 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.037435 kernel: audit: type=1400 audit(1747183717.015:838): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit: BPF prog-id=141 op=LOAD May 14 00:48:37.015000 audit[3231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3122 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316561653266366264656236313233613739383034616663396536 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.015000 audit: BPF prog-id=142 op=LOAD May 14 00:48:37.015000 audit[3231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3122 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316561653266366264656236313233613739383034616663396536 May 14 00:48:37.017000 audit: BPF prog-id=142 op=UNLOAD May 14 00:48:37.017000 audit: BPF prog-id=141 op=UNLOAD May 14 00:48:37.017000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.017000 audit: BPF prog-id=143 op=LOAD May 14 00:48:37.017000 audit[3231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3122 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333316561653266366264656236313233613739383034616663396536 May 14 00:48:37.067137 env[1217]: time="2025-05-14T00:48:37.067090692Z" level=info msg="StartContainer for \"c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d\" returns successfully" May 14 00:48:37.446375 kubelet[1454]: E0514 00:48:37.446334 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:37.635708 kubelet[1454]: I0514 00:48:37.635657 1454 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="1d8ebd55-c963-455a-b911-c3d19b7f78db" path="/var/lib/kubelet/pods/1d8ebd55-c963-455a-b911-c3d19b7f78db/volumes" May 14 00:48:37.664653 systemd[1]: cri-containerd-c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d.scope: Deactivated successfully. May 14 00:48:37.668000 audit: BPF prog-id=143 op=UNLOAD May 14 00:48:37.681656 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d-rootfs.mount: Deactivated successfully. May 14 00:48:37.713106 env[1217]: time="2025-05-14T00:48:37.713000073Z" level=info msg="shim disconnected" id=c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d May 14 00:48:37.713635 env[1217]: time="2025-05-14T00:48:37.713608199Z" level=warning msg="cleaning up after shim disconnected" id=c31eae2f6bdeb6123a79804afc9e641b116bc9a34df42e02109291734a70af3d namespace=k8s.io May 14 00:48:37.713696 env[1217]: time="2025-05-14T00:48:37.713683780Z" level=info msg="cleaning up dead shim" May 14 00:48:37.719950 env[1217]: time="2025-05-14T00:48:37.719914284Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:48:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3272 runtime=io.containerd.runc.v2\n" May 14 00:48:37.733985 kubelet[1454]: E0514 00:48:37.733700 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:37.749661 env[1217]: time="2025-05-14T00:48:37.749613965Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 14 00:48:37.773541 env[1217]: time="2025-05-14T00:48:37.773478891Z" level=info msg="CreateContainer within sandbox \"40d824246a90262d1d6e0577cdb963fe20b9b98932283f3966fbb2596a14172b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cc1f16887dce8b79a6d39a505e7a5c62c961d87f39ddda978124ccd5df624a6b\"" May 14 00:48:37.774093 env[1217]: time="2025-05-14T00:48:37.774054288Z" level=info msg="StartContainer for \"cc1f16887dce8b79a6d39a505e7a5c62c961d87f39ddda978124ccd5df624a6b\"" May 14 00:48:37.774371 env[1217]: time="2025-05-14T00:48:37.774344327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:37.775630 env[1217]: time="2025-05-14T00:48:37.775595189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:37.779603 env[1217]: time="2025-05-14T00:48:37.779076341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:37.792221 systemd[1]: Started cri-containerd-cc1f16887dce8b79a6d39a505e7a5c62c961d87f39ddda978124ccd5df624a6b.scope. May 14 00:48:37.792974 env[1217]: time="2025-05-14T00:48:37.792916766Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 14 00:48:37.793209 env[1217]: time="2025-05-14T00:48:37.793180878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:37.795603 env[1217]: time="2025-05-14T00:48:37.795486949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 14 00:48:37.798625 env[1217]: time="2025-05-14T00:48:37.798573192Z" level=info msg="CreateContainer within sandbox \"df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 14 00:48:37.831931 env[1217]: time="2025-05-14T00:48:37.831879700Z" level=info msg="CreateContainer within sandbox \"df0b1d99c4a1876dc908282ec1567bf511e59d876c48e4f839ad6901c447b4e2\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"66c217ab0e6878796f24f869ce83dec6df39b02ed10a4402f19f41d1d8039fcf\"" May 14 00:48:37.832589 env[1217]: time="2025-05-14T00:48:37.832561806Z" level=info msg="StartContainer for \"66c217ab0e6878796f24f869ce83dec6df39b02ed10a4402f19f41d1d8039fcf\"" May 14 00:48:37.840000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.840000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3122 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316631363838376463653862373961366433396135303565376135 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit: BPF prog-id=144 op=LOAD May 14 00:48:37.841000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3122 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316631363838376463653862373961366433396135303565376135 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.841000 audit: BPF prog-id=145 op=LOAD May 14 00:48:37.841000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3122 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316631363838376463653862373961366433396135303565376135 May 14 00:48:37.843000 audit: BPF prog-id=145 op=UNLOAD May 14 00:48:37.843000 audit: BPF prog-id=144 op=UNLOAD May 14 00:48:37.843000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.843000 audit: BPF prog-id=146 op=LOAD May 14 00:48:37.843000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3122 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316631363838376463653862373961366433396135303565376135 May 14 00:48:37.856642 systemd[1]: Started cri-containerd-66c217ab0e6878796f24f869ce83dec6df39b02ed10a4402f19f41d1d8039fcf.scope. May 14 00:48:37.859036 env[1217]: time="2025-05-14T00:48:37.858989953Z" level=info msg="StartContainer for \"cc1f16887dce8b79a6d39a505e7a5c62c961d87f39ddda978124ccd5df624a6b\" returns successfully" May 14 00:48:37.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit: BPF prog-id=147 op=LOAD May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2933 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633231376162306536383738373936663234663836396365383364 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2933 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633231376162306536383738373936663234663836396365383364 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit: BPF prog-id=148 op=LOAD May 14 00:48:37.948000 audit[3320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2933 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633231376162306536383738373936663234663836396365383364 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit: BPF prog-id=149 op=LOAD May 14 00:48:37.948000 audit[3320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2933 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633231376162306536383738373936663234663836396365383364 May 14 00:48:37.948000 audit: BPF prog-id=149 op=UNLOAD May 14 00:48:37.948000 audit: BPF prog-id=148 op=UNLOAD May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:37.948000 audit: BPF prog-id=150 op=LOAD May 14 00:48:37.948000 audit[3320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2933 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633231376162306536383738373936663234663836396365383364 May 14 00:48:37.968465 env[1217]: time="2025-05-14T00:48:37.968313287Z" level=info msg="StartContainer for \"66c217ab0e6878796f24f869ce83dec6df39b02ed10a4402f19f41d1d8039fcf\" returns successfully" May 14 00:48:38.046000 audit[3375]: AVC avc: denied { search } for pid=3375 comm="rpcbind" name="crypto" dev="proc" ino=19345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 14 00:48:38.046000 audit[3375]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9af4f000 a2=0 a3=0 items=0 ppid=3340 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 key=(null) May 14 00:48:38.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 14 00:48:38.089000 audit[3380]: AVC avc: denied { search } for pid=3380 comm="dbus-daemon" name="crypto" dev="proc" ino=19345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 14 00:48:38.089000 audit[3380]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa9fdf000 a2=0 a3=0 items=0 ppid=3340 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 key=(null) May 14 00:48:38.089000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 14 00:48:38.096000 audit[3381]: AVC avc: denied { watch } for pid=3381 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538148 scontext=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c347,c495 tclass=dir permissive=0 May 14 00:48:38.096000 audit[3381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaabcd21630 a2=2c8 a3=aaaabcd0ba60 items=0 ppid=3340 pid=3381 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 key=(null) May 14 00:48:38.096000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 14 00:48:38.100000 audit[3382]: AVC avc: denied { read } for pid=3382 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=17359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 14 00:48:38.100000 audit[3382]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb7dca570 a2=80000 a3=0 items=0 ppid=3340 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 key=(null) May 14 00:48:38.100000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 14 00:48:38.101000 audit[3382]: AVC avc: denied { search } for pid=3382 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 14 00:48:38.101000 audit[3382]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb715f000 a2=0 a3=0 items=0 ppid=3340 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c347,c495 key=(null) May 14 00:48:38.101000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 14 00:48:38.446507 kubelet[1454]: E0514 00:48:38.446457 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:38.738618 kubelet[1454]: E0514 00:48:38.738525 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:38.745790 kubelet[1454]: I0514 00:48:38.745719 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.779495847 podStartE2EDuration="5.745702353s" podCreationTimestamp="2025-05-14 00:48:33 +0000 UTC" firstStartedPulling="2025-05-14 00:48:33.828827359 +0000 UTC m=+35.310786049" lastFinishedPulling="2025-05-14 00:48:37.795033865 +0000 UTC m=+39.276992555" observedRunningTime="2025-05-14 00:48:38.745362025 +0000 UTC m=+40.227320715" watchObservedRunningTime="2025-05-14 00:48:38.745702353 +0000 UTC m=+40.227661043" May 14 00:48:38.760000 audit[3425]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=3425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.760000 audit[3425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd44f1a50 a2=0 a3=1 items=0 ppid=1612 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:38.777000 audit[3425]: NETFILTER_CFG table=nat:102 family=2 entries=106 op=nft_register_chain pid=3425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:38.777000 audit[3425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd44f1a50 a2=0 a3=1 items=0 ppid=1612 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:38.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.151922 env[1217]: time="2025-05-14T00:48:39.151864921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:39.152970 env[1217]: time="2025-05-14T00:48:39.152932506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:39.155742 env[1217]: time="2025-05-14T00:48:39.155702952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:39.157213 env[1217]: time="2025-05-14T00:48:39.157139388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:39.157816 env[1217]: time="2025-05-14T00:48:39.157774985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 14 00:48:39.172145 env[1217]: time="2025-05-14T00:48:39.172074168Z" level=info msg="CreateContainer within sandbox \"24014f9447fc542f2d802d6533f04ff7b3bb1cdb6885b73ef7369090795608fc\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 14 00:48:39.175000 audit[3506]: AVC avc: denied { write } for pid=3506 comm="tee" name="fd" dev="proc" ino=20525 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.175000 audit[3506]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff43dfa2b a2=241 a3=1b6 items=1 ppid=3445 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.175000 audit: CWD cwd="/etc/service/enabled/cni/log" May 14 00:48:39.175000 audit: PATH item=0 name="/dev/fd/63" inode=20522 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.175000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.179000 audit[3493]: AVC avc: denied { write } for pid=3493 comm="tee" name="fd" dev="proc" ino=20529 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.179000 audit[3493]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee740a2a a2=241 a3=1b6 items=1 ppid=3459 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.179000 audit: CWD cwd="/etc/service/enabled/bird/log" May 14 00:48:39.179000 audit: PATH item=0 name="/dev/fd/63" inode=18242 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.179000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.181000 audit[3490]: AVC avc: denied { write } for pid=3490 comm="tee" name="fd" dev="proc" ino=20533 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.181000 audit[3490]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe72aaa29 a2=241 a3=1b6 items=1 ppid=3446 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.181000 audit: CWD cwd="/etc/service/enabled/confd/log" May 14 00:48:39.181000 audit: PATH item=0 name="/dev/fd/63" inode=20089 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.182000 audit[3487]: AVC avc: denied { write } for pid=3487 comm="tee" name="fd" dev="proc" ino=18250 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.182000 audit[3487]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd3efba19 a2=241 a3=1b6 items=1 ppid=3455 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.182000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 14 00:48:39.182000 audit: PATH item=0 name="/dev/fd/63" inode=20519 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.183000 audit[3497]: AVC avc: denied { write } for pid=3497 comm="tee" name="fd" dev="proc" ino=18254 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.183000 audit[3497]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8918a29 a2=241 a3=1b6 items=1 ppid=3453 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.183000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 14 00:48:39.183000 audit: PATH item=0 name="/dev/fd/63" inode=18246 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.183000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.192000 audit[3520]: AVC avc: denied { write } for pid=3520 comm="tee" name="fd" dev="proc" ino=20537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.192000 audit[3520]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5fe9a1a a2=241 a3=1b6 items=1 ppid=3461 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.192000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 14 00:48:39.192000 audit: PATH item=0 name="/dev/fd/63" inode=19408 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.192000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.195000 audit[3524]: AVC avc: denied { write } for pid=3524 comm="tee" name="fd" dev="proc" ino=18258 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:48:39.195000 audit[3524]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4896a29 a2=241 a3=1b6 items=1 ppid=3457 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.195000 audit: CWD cwd="/etc/service/enabled/felix/log" May 14 00:48:39.195000 audit: PATH item=0 name="/dev/fd/63" inode=20096 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:39.195000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:48:39.241047 env[1217]: time="2025-05-14T00:48:39.240997045Z" level=info msg="CreateContainer within sandbox \"24014f9447fc542f2d802d6533f04ff7b3bb1cdb6885b73ef7369090795608fc\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"514f2b9cee34751e2ca6579844cf2421021bde918aa03c542995af47609981df\"" May 14 00:48:39.244406 env[1217]: time="2025-05-14T00:48:39.241786601Z" level=info msg="StartContainer for \"514f2b9cee34751e2ca6579844cf2421021bde918aa03c542995af47609981df\"" May 14 00:48:39.262065 systemd[1]: Started cri-containerd-514f2b9cee34751e2ca6579844cf2421021bde918aa03c542995af47609981df.scope. May 14 00:48:39.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit: BPF prog-id=151 op=LOAD May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3072 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346632623963656533343735316532636136353739383434636632 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3072 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346632623963656533343735316532636136353739383434636632 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.299000 audit: BPF prog-id=152 op=LOAD May 14 00:48:39.299000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3072 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346632623963656533343735316532636136353739383434636632 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit: BPF prog-id=153 op=LOAD May 14 00:48:39.300000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3072 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346632623963656533343735316532636136353739383434636632 May 14 00:48:39.300000 audit: BPF prog-id=153 op=UNLOAD May 14 00:48:39.300000 audit: BPF prog-id=152 op=UNLOAD May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:39.300000 audit: BPF prog-id=154 op=LOAD May 14 00:48:39.300000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3072 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346632623963656533343735316532636136353739383434636632 May 14 00:48:39.320437 env[1217]: time="2025-05-14T00:48:39.320390396Z" level=info msg="StartContainer for \"514f2b9cee34751e2ca6579844cf2421021bde918aa03c542995af47609981df\" returns successfully" May 14 00:48:39.415765 kubelet[1454]: E0514 00:48:39.415661 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:39.446780 kubelet[1454]: E0514 00:48:39.446729 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:39.742311 kubelet[1454]: E0514 00:48:39.742209 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:39.742661 kubelet[1454]: E0514 00:48:39.742640 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:39.757004 kubelet[1454]: I0514 00:48:39.756921 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-g6lqc" podStartSLOduration=4.75690215 podStartE2EDuration="4.75690215s" podCreationTimestamp="2025-05-14 00:48:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:48:38.768834212 +0000 UTC m=+40.250792902" watchObservedRunningTime="2025-05-14 00:48:39.75690215 +0000 UTC m=+41.238860840" May 14 00:48:39.769351 kubelet[1454]: I0514 00:48:39.769135 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-fbdc8b97c-kk5mj" podStartSLOduration=1.383441844 podStartE2EDuration="4.769118577s" podCreationTimestamp="2025-05-14 00:48:35 +0000 UTC" firstStartedPulling="2025-05-14 00:48:35.773122786 +0000 UTC m=+37.255081476" lastFinishedPulling="2025-05-14 00:48:39.158799519 +0000 UTC m=+40.640758209" observedRunningTime="2025-05-14 00:48:39.757531066 +0000 UTC m=+41.239489756" watchObservedRunningTime="2025-05-14 00:48:39.769118577 +0000 UTC m=+41.251077267" May 14 00:48:39.778000 audit[3593]: NETFILTER_CFG table=filter:103 family=2 entries=8 op=nft_register_rule pid=3593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.778000 audit[3593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffefaf05d0 a2=0 a3=1 items=0 ppid=1612 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.789000 audit[3593]: NETFILTER_CFG table=nat:104 family=2 entries=56 op=nft_register_chain pid=3593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.789000 audit[3593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18692 a0=3 a1=ffffefaf05d0 a2=0 a3=1 items=0 ppid=1612 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.906000 audit[3601]: NETFILTER_CFG table=filter:105 family=2 entries=8 op=nft_register_rule pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.906000 audit[3601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcfbd8f40 a2=0 a3=1 items=0 ppid=1612 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:39.917000 audit[3601]: NETFILTER_CFG table=nat:106 family=2 entries=54 op=nft_register_rule pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:39.917000 audit[3601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffcfbd8f40 a2=0 a3=1 items=0 ppid=1612 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:39.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:40.447480 kubelet[1454]: E0514 00:48:40.447427 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:40.478000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.478000 audit: BPF prog-id=155 op=LOAD May 14 00:48:40.478000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc9d063d8 a2=98 a3=ffffc9d063c8 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.478000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.478000 audit: BPF prog-id=155 op=UNLOAD May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit: BPF prog-id=156 op=LOAD May 14 00:48:40.479000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc9d06068 a2=74 a3=95 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.479000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.479000 audit: BPF prog-id=156 op=UNLOAD May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.479000 audit: BPF prog-id=157 op=LOAD May 14 00:48:40.479000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc9d060c8 a2=94 a3=2 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.479000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.479000 audit: BPF prog-id=157 op=UNLOAD May 14 00:48:40.569000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.569000 audit: BPF prog-id=158 op=LOAD May 14 00:48:40.569000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc9d06088 a2=40 a3=ffffc9d060b8 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.569000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.570000 audit: BPF prog-id=158 op=UNLOAD May 14 00:48:40.570000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.570000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc9d061a0 a2=50 a3=0 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.570000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.578000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.578000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d060f8 a2=28 a3=ffffc9d06228 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc9d06128 a2=28 a3=ffffc9d06258 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc9d05fd8 a2=28 a3=ffffc9d06108 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d06148 a2=28 a3=ffffc9d06278 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d06128 a2=28 a3=ffffc9d06258 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d06118 a2=28 a3=ffffc9d06248 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.579000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.579000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d06148 a2=28 a3=ffffc9d06278 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc9d06128 a2=28 a3=ffffc9d06258 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc9d06148 a2=28 a3=ffffc9d06278 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc9d06118 a2=28 a3=ffffc9d06248 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc9d06198 a2=28 a3=ffffc9d062d8 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc9d05ed0 a2=50 a3=0 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.580000 audit: BPF prog-id=159 op=LOAD May 14 00:48:40.580000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc9d05ed8 a2=94 a3=5 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.581000 audit: BPF prog-id=159 op=UNLOAD May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc9d05fe0 a2=50 a3=0 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.581000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc9d06128 a2=4 a3=3 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.581000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.581000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.581000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc9d06108 a2=94 a3=6 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.582000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.582000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.582000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc9d058d8 a2=94 a3=83 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.583000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.583000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.583000 audit[3665]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc9d058d8 a2=94 a3=83 items=0 ppid=3630 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.583000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit: BPF prog-id=160 op=LOAD May 14 00:48:40.598000 audit[3668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd8a9c1b8 a2=98 a3=ffffd8a9c1a8 items=0 ppid=3630 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:40.598000 audit: BPF prog-id=160 op=UNLOAD May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit: BPF prog-id=161 op=LOAD May 14 00:48:40.598000 audit[3668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd8a9c068 a2=74 a3=95 items=0 ppid=3630 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:40.598000 audit: BPF prog-id=161 op=UNLOAD May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.598000 audit: BPF prog-id=162 op=LOAD May 14 00:48:40.598000 audit[3668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd8a9c098 a2=40 a3=ffffd8a9c0c8 items=0 ppid=3630 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:48:40.598000 audit: BPF prog-id=162 op=UNLOAD May 14 00:48:40.668000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.668000 audit: BPF prog-id=163 op=LOAD May 14 00:48:40.668000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4d7e9d8 a2=98 a3=ffffe4d7e9c8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.668000 audit: BPF prog-id=163 op=UNLOAD May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit: BPF prog-id=164 op=LOAD May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4d7e6b8 a2=74 a3=95 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit: BPF prog-id=164 op=UNLOAD May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit: BPF prog-id=165 op=LOAD May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4d7e718 a2=94 a3=2 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit: BPF prog-id=165 op=UNLOAD May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e748 a2=28 a3=ffffe4d7e878 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe4d7e778 a2=28 a3=ffffe4d7e8a8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe4d7e628 a2=28 a3=ffffe4d7e758 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e798 a2=28 a3=ffffe4d7e8c8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e778 a2=28 a3=ffffe4d7e8a8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e768 a2=28 a3=ffffe4d7e898 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e798 a2=28 a3=ffffe4d7e8c8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe4d7e778 a2=28 a3=ffffe4d7e8a8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe4d7e798 a2=28 a3=ffffe4d7e8c8 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe4d7e768 a2=28 a3=ffffe4d7e898 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe4d7e7e8 a2=28 a3=ffffe4d7e928 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.669000 audit: BPF prog-id=166 op=LOAD May 14 00:48:40.669000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe4d7e608 a2=40 a3=ffffe4d7e638 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.669000 audit: BPF prog-id=166 op=UNLOAD May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe4d7e630 a2=50 a3=0 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe4d7e630 a2=50 a3=0 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit: BPF prog-id=167 op=LOAD May 14 00:48:40.670000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe4d7dd98 a2=94 a3=2 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.670000 audit: BPF prog-id=167 op=UNLOAD May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { perfmon } for pid=3691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit[3691]: AVC avc: denied { bpf } for pid=3691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.670000 audit: BPF prog-id=168 op=LOAD May 14 00:48:40.670000 audit[3691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe4d7df28 a2=94 a3=30 items=0 ppid=3630 pid=3691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit: BPF prog-id=169 op=LOAD May 14 00:48:40.676000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb694fe8 a2=98 a3=ffffeb694fd8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.676000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.676000 audit: BPF prog-id=169 op=UNLOAD May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit: BPF prog-id=170 op=LOAD May 14 00:48:40.676000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb694c78 a2=74 a3=95 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.676000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.676000 audit: BPF prog-id=170 op=UNLOAD May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.676000 audit: BPF prog-id=171 op=LOAD May 14 00:48:40.676000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb694cd8 a2=94 a3=2 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.676000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.676000 audit: BPF prog-id=171 op=UNLOAD May 14 00:48:40.743898 kubelet[1454]: E0514 00:48:40.743793 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:40.768000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit: BPF prog-id=172 op=LOAD May 14 00:48:40.768000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb694c98 a2=40 a3=ffffeb694cc8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.768000 audit: BPF prog-id=172 op=UNLOAD May 14 00:48:40.768000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.768000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeb694db0 a2=50 a3=0 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694d08 a2=28 a3=ffffeb694e38 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb694d38 a2=28 a3=ffffeb694e68 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb694be8 a2=28 a3=ffffeb694d18 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694d58 a2=28 a3=ffffeb694e88 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694d38 a2=28 a3=ffffeb694e68 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694d28 a2=28 a3=ffffeb694e58 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694d58 a2=28 a3=ffffeb694e88 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb694d38 a2=28 a3=ffffeb694e68 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb694d58 a2=28 a3=ffffeb694e88 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb694d28 a2=28 a3=ffffeb694e58 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb694da8 a2=28 a3=ffffeb694ee8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb694ae0 a2=50 a3=0 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit: BPF prog-id=173 op=LOAD May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeb694ae8 a2=94 a3=5 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit: BPF prog-id=173 op=UNLOAD May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb694bf0 a2=50 a3=0 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeb694d38 a2=4 a3=3 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.777000 audit[3696]: AVC avc: denied { confidentiality } for pid=3696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.777000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb694d18 a2=94 a3=6 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.777000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { confidentiality } for pid=3696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.778000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb6944e8 a2=94 a3=83 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.778000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { confidentiality } for pid=3696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:40.778000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb6944e8 a2=94 a3=83 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.778000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.778000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.778000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeb695f28 a2=10 a3=ffffeb696018 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.778000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.782000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.782000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeb695de8 a2=10 a3=ffffeb695ed8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.782000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.782000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeb695d58 a2=10 a3=ffffeb695ed8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.782000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:40.782000 audit[3696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeb695d58 a2=10 a3=ffffeb695ed8 items=0 ppid=3630 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:40.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:48:40.790000 audit: BPF prog-id=168 op=UNLOAD May 14 00:48:41.447818 kubelet[1454]: E0514 00:48:41.447783 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:41.745172 kubelet[1454]: E0514 00:48:41.745061 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:48:42.448900 kubelet[1454]: E0514 00:48:42.448827 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:43.449545 kubelet[1454]: E0514 00:48:43.449506 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:44.451020 kubelet[1454]: E0514 00:48:44.450981 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:45.452005 kubelet[1454]: E0514 00:48:45.451946 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:46.452331 kubelet[1454]: E0514 00:48:46.452267 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:47.453297 kubelet[1454]: E0514 00:48:47.453232 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:48.453864 kubelet[1454]: E0514 00:48:48.453819 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:49.454173 kubelet[1454]: E0514 00:48:49.454129 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:49.917489 kubelet[1454]: I0514 00:48:49.917424 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:48:49.950000 audit[3747]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.953977 kernel: kauditd_printk_skb: 727 callbacks suppressed May 14 00:48:49.954032 kernel: audit: type=1325 audit(1747183729.950:995): table=filter:107 family=2 entries=8 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.954053 kernel: audit: type=1300 audit(1747183729.950:995): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc414af30 a2=0 a3=1 items=0 ppid=1612 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.950000 audit[3747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc414af30 a2=0 a3=1 items=0 ppid=1612 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.957741 kernel: audit: type=1327 audit(1747183729.950:995): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.964000 audit[3747]: NETFILTER_CFG table=nat:108 family=2 entries=64 op=nft_register_chain pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.964000 audit[3747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22340 a0=3 a1=ffffc414af30 a2=0 a3=1 items=0 ppid=1612 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.970053 kernel: audit: type=1325 audit(1747183729.964:996): table=nat:108 family=2 entries=64 op=nft_register_chain pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.970116 kernel: audit: type=1300 audit(1747183729.964:996): arch=c00000b7 syscall=211 success=yes exit=22340 a0=3 a1=ffffc414af30 a2=0 a3=1 items=0 ppid=1612 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.970154 kernel: audit: type=1327 audit(1747183729.964:996): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.983000 audit[3749]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.983000 audit[3749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcb345e30 a2=0 a3=1 items=0 ppid=1612 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.988402 kernel: audit: type=1325 audit(1747183729.983:997): table=filter:109 family=2 entries=8 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.988469 kernel: audit: type=1300 audit(1747183729.983:997): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcb345e30 a2=0 a3=1 items=0 ppid=1612 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.989974 kernel: audit: type=1327 audit(1747183729.983:997): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.992000 audit[3749]: NETFILTER_CFG table=nat:110 family=2 entries=64 op=nft_unregister_chain pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:49.992000 audit[3749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20580 a0=3 a1=ffffcb345e30 a2=0 a3=1 items=0 ppid=1612 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:49.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:49.996182 kernel: audit: type=1325 audit(1747183729.992:998): table=nat:110 family=2 entries=64 op=nft_unregister_chain pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:50.455353 kubelet[1454]: E0514 00:48:50.455300 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:51.010000 audit[3759]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:51.010000 audit[3759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff6868c30 a2=0 a3=1 items=0 ppid=1612 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:51.025000 audit[3759]: NETFILTER_CFG table=nat:112 family=2 entries=60 op=nft_register_rule pid=3759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:48:51.025000 audit[3759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffff6868c30 a2=0 a3=1 items=0 ppid=1612 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:48:51.253799 systemd[1]: Created slice kubepods-besteffort-pod8aeb3d81_2fd0_4e94_8a2d_5a1275d4ed51.slice. May 14 00:48:51.371980 kubelet[1454]: I0514 00:48:51.371920 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-268ecf87-8ac3-4418-9d56-325293927109\" (UniqueName: \"kubernetes.io/nfs/8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51-pvc-268ecf87-8ac3-4418-9d56-325293927109\") pod \"test-pod-1\" (UID: \"8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51\") " pod="default/test-pod-1" May 14 00:48:51.371980 kubelet[1454]: I0514 00:48:51.371962 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jssj7\" (UniqueName: \"kubernetes.io/projected/8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51-kube-api-access-jssj7\") pod \"test-pod-1\" (UID: \"8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51\") " pod="default/test-pod-1" May 14 00:48:51.456020 kubelet[1454]: E0514 00:48:51.455973 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:51.486000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.486000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.489259 kernel: Failed to create system directory netfs May 14 00:48:51.489306 kernel: Failed to create system directory netfs May 14 00:48:51.489323 kernel: Failed to create system directory netfs May 14 00:48:51.486000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.486000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.490170 kernel: Failed to create system directory netfs May 14 00:48:51.486000 audit[3763]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaec2955e0 a1=12c14 a2=aaaad403e028 a3=aaaaec286010 items=0 ppid=656 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.486000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.499344 kernel: Failed to create system directory fscache May 14 00:48:51.499391 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.500480 kernel: Failed to create system directory fscache May 14 00:48:51.500518 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.501579 kernel: Failed to create system directory fscache May 14 00:48:51.501613 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.502202 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.503196 kernel: Failed to create system directory fscache May 14 00:48:51.503231 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.504527 kernel: Failed to create system directory fscache May 14 00:48:51.504576 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.505172 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.506220 kernel: Failed to create system directory fscache May 14 00:48:51.506255 kernel: Failed to create system directory fscache May 14 00:48:51.494000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.494000 audit[3763]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaec4a8210 a1=4c344 a2=aaaad403e028 a3=aaaaec286010 items=0 ppid=656 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.507189 kernel: FS-Cache: Loaded May 14 00:48:51.494000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.529451 kernel: Failed to create system directory sunrpc May 14 00:48:51.529493 kernel: Failed to create system directory sunrpc May 14 00:48:51.529510 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.530507 kernel: Failed to create system directory sunrpc May 14 00:48:51.530538 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.531563 kernel: Failed to create system directory sunrpc May 14 00:48:51.531610 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.532176 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.533203 kernel: Failed to create system directory sunrpc May 14 00:48:51.533228 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.534208 kernel: Failed to create system directory sunrpc May 14 00:48:51.534243 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.535240 kernel: Failed to create system directory sunrpc May 14 00:48:51.535275 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.536294 kernel: Failed to create system directory sunrpc May 14 00:48:51.536330 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.537352 kernel: Failed to create system directory sunrpc May 14 00:48:51.537389 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.538394 kernel: Failed to create system directory sunrpc May 14 00:48:51.538444 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.539456 kernel: Failed to create system directory sunrpc May 14 00:48:51.539492 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.540521 kernel: Failed to create system directory sunrpc May 14 00:48:51.540561 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.541577 kernel: Failed to create system directory sunrpc May 14 00:48:51.541612 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.542172 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.543594 kernel: Failed to create system directory sunrpc May 14 00:48:51.543632 kernel: Failed to create system directory sunrpc May 14 00:48:51.543648 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.544170 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.545185 kernel: Failed to create system directory sunrpc May 14 00:48:51.545222 kernel: Failed to create system directory sunrpc May 14 00:48:51.545241 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.546476 kernel: Failed to create system directory sunrpc May 14 00:48:51.546500 kernel: Failed to create system directory sunrpc May 14 00:48:51.546515 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.547277 kernel: Failed to create system directory sunrpc May 14 00:48:51.547304 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.548530 kernel: Failed to create system directory sunrpc May 14 00:48:51.548554 kernel: Failed to create system directory sunrpc May 14 00:48:51.548568 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.549406 kernel: Failed to create system directory sunrpc May 14 00:48:51.549437 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.550209 kernel: Failed to create system directory sunrpc May 14 00:48:51.550234 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.551422 kernel: Failed to create system directory sunrpc May 14 00:48:51.551446 kernel: Failed to create system directory sunrpc May 14 00:48:51.551468 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.552265 kernel: Failed to create system directory sunrpc May 14 00:48:51.552288 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.553519 kernel: Failed to create system directory sunrpc May 14 00:48:51.553544 kernel: Failed to create system directory sunrpc May 14 00:48:51.553565 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.554360 kernel: Failed to create system directory sunrpc May 14 00:48:51.554383 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.555190 kernel: Failed to create system directory sunrpc May 14 00:48:51.555214 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.556437 kernel: Failed to create system directory sunrpc May 14 00:48:51.556458 kernel: Failed to create system directory sunrpc May 14 00:48:51.556471 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.557269 kernel: Failed to create system directory sunrpc May 14 00:48:51.557291 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.558558 kernel: Failed to create system directory sunrpc May 14 00:48:51.558586 kernel: Failed to create system directory sunrpc May 14 00:48:51.558602 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.559423 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.560297 kernel: Failed to create system directory sunrpc May 14 00:48:51.560318 kernel: Failed to create system directory sunrpc May 14 00:48:51.560331 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.561569 kernel: Failed to create system directory sunrpc May 14 00:48:51.561595 kernel: Failed to create system directory sunrpc May 14 00:48:51.561613 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.562423 kernel: Failed to create system directory sunrpc May 14 00:48:51.562447 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.563250 kernel: Failed to create system directory sunrpc May 14 00:48:51.563276 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.564506 kernel: Failed to create system directory sunrpc May 14 00:48:51.564529 kernel: Failed to create system directory sunrpc May 14 00:48:51.564543 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.565347 kernel: Failed to create system directory sunrpc May 14 00:48:51.565371 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.566185 kernel: Failed to create system directory sunrpc May 14 00:48:51.566216 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.567448 kernel: Failed to create system directory sunrpc May 14 00:48:51.567478 kernel: Failed to create system directory sunrpc May 14 00:48:51.567492 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.568341 kernel: Failed to create system directory sunrpc May 14 00:48:51.568376 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.569228 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.570533 kernel: Failed to create system directory sunrpc May 14 00:48:51.570554 kernel: Failed to create system directory sunrpc May 14 00:48:51.570569 kernel: Failed to create system directory sunrpc May 14 00:48:51.570585 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.571378 kernel: Failed to create system directory sunrpc May 14 00:48:51.571400 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.572231 kernel: Failed to create system directory sunrpc May 14 00:48:51.572262 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.573593 kernel: Failed to create system directory sunrpc May 14 00:48:51.573630 kernel: Failed to create system directory sunrpc May 14 00:48:51.573645 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.574451 kernel: Failed to create system directory sunrpc May 14 00:48:51.574474 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.575295 kernel: Failed to create system directory sunrpc May 14 00:48:51.575320 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.576564 kernel: Failed to create system directory sunrpc May 14 00:48:51.576588 kernel: Failed to create system directory sunrpc May 14 00:48:51.576604 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.577405 kernel: Failed to create system directory sunrpc May 14 00:48:51.577435 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.578260 kernel: Failed to create system directory sunrpc May 14 00:48:51.578285 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.579586 kernel: Failed to create system directory sunrpc May 14 00:48:51.579609 kernel: Failed to create system directory sunrpc May 14 00:48:51.579623 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.580438 kernel: Failed to create system directory sunrpc May 14 00:48:51.580479 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.583415 kernel: Failed to create system directory sunrpc May 14 00:48:51.583486 kernel: Failed to create system directory sunrpc May 14 00:48:51.583508 kernel: Failed to create system directory sunrpc May 14 00:48:51.583523 kernel: Failed to create system directory sunrpc May 14 00:48:51.583572 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.584256 kernel: Failed to create system directory sunrpc May 14 00:48:51.584279 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.585533 kernel: Failed to create system directory sunrpc May 14 00:48:51.585567 kernel: Failed to create system directory sunrpc May 14 00:48:51.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.597488 kernel: RPC: Registered named UNIX socket transport module. May 14 00:48:51.597572 kernel: RPC: Registered udp transport module. May 14 00:48:51.597600 kernel: RPC: Registered tcp transport module. May 14 00:48:51.597621 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 14 00:48:51.521000 audit[3763]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaec4f4560 a1=14a72c a2=aaaad403e028 a3=aaaaec286010 items=6 ppid=656 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.521000 audit: CWD cwd="/" May 14 00:48:51.521000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PATH item=1 name=(null) inode=23625 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PATH item=2 name=(null) inode=23625 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PATH item=3 name=(null) inode=23626 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PATH item=4 name=(null) inode=23625 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PATH item=5 name=(null) inode=23627 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:48:51.521000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.626221 kernel: Failed to create system directory nfs May 14 00:48:51.626259 kernel: Failed to create system directory nfs May 14 00:48:51.626284 kernel: Failed to create system directory nfs May 14 00:48:51.626300 kernel: Failed to create system directory nfs May 14 00:48:51.626315 kernel: Failed to create system directory nfs May 14 00:48:51.626330 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.633694 kernel: Failed to create system directory nfs May 14 00:48:51.633776 kernel: Failed to create system directory nfs May 14 00:48:51.633794 kernel: Failed to create system directory nfs May 14 00:48:51.633808 kernel: Failed to create system directory nfs May 14 00:48:51.633823 kernel: Failed to create system directory nfs May 14 00:48:51.633854 kernel: Failed to create system directory nfs May 14 00:48:51.633874 kernel: Failed to create system directory nfs May 14 00:48:51.633890 kernel: Failed to create system directory nfs May 14 00:48:51.633905 kernel: Failed to create system directory nfs May 14 00:48:51.633920 kernel: Failed to create system directory nfs May 14 00:48:51.633941 kernel: Failed to create system directory nfs May 14 00:48:51.633957 kernel: Failed to create system directory nfs May 14 00:48:51.633974 kernel: Failed to create system directory nfs May 14 00:48:51.633991 kernel: Failed to create system directory nfs May 14 00:48:51.634004 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.637505 kernel: Failed to create system directory nfs May 14 00:48:51.637573 kernel: Failed to create system directory nfs May 14 00:48:51.637609 kernel: Failed to create system directory nfs May 14 00:48:51.637629 kernel: Failed to create system directory nfs May 14 00:48:51.637644 kernel: Failed to create system directory nfs May 14 00:48:51.637658 kernel: Failed to create system directory nfs May 14 00:48:51.637671 kernel: Failed to create system directory nfs May 14 00:48:51.637688 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.640152 kernel: Failed to create system directory nfs May 14 00:48:51.640229 kernel: Failed to create system directory nfs May 14 00:48:51.640248 kernel: Failed to create system directory nfs May 14 00:48:51.640263 kernel: Failed to create system directory nfs May 14 00:48:51.640278 kernel: Failed to create system directory nfs May 14 00:48:51.640293 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.640390 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.641202 kernel: Failed to create system directory nfs May 14 00:48:51.641245 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.642375 kernel: Failed to create system directory nfs May 14 00:48:51.642412 kernel: Failed to create system directory nfs May 14 00:48:51.642429 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.643191 kernel: Failed to create system directory nfs May 14 00:48:51.643225 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.644364 kernel: Failed to create system directory nfs May 14 00:48:51.644382 kernel: Failed to create system directory nfs May 14 00:48:51.644400 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.645167 kernel: Failed to create system directory nfs May 14 00:48:51.645189 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.646356 kernel: Failed to create system directory nfs May 14 00:48:51.646381 kernel: Failed to create system directory nfs May 14 00:48:51.646395 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.647555 kernel: Failed to create system directory nfs May 14 00:48:51.647576 kernel: Failed to create system directory nfs May 14 00:48:51.647594 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.648368 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.649216 kernel: Failed to create system directory nfs May 14 00:48:51.649237 kernel: Failed to create system directory nfs May 14 00:48:51.649253 kernel: Failed to create system directory nfs May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.618000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.650459 kernel: Failed to create system directory nfs May 14 00:48:51.650475 kernel: Failed to create system directory nfs May 14 00:48:51.667181 kernel: FS-Cache: Netfs 'nfs' registered for caching May 14 00:48:51.618000 audit[3763]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaec69d9f0 a1=1162dc a2=aaaad403e028 a3=aaaaec286010 items=0 ppid=656 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.618000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.702422 kernel: Failed to create system directory nfs4 May 14 00:48:51.702464 kernel: Failed to create system directory nfs4 May 14 00:48:51.702485 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.703395 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.704303 kernel: Failed to create system directory nfs4 May 14 00:48:51.704321 kernel: Failed to create system directory nfs4 May 14 00:48:51.704341 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.705168 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.706480 kernel: Failed to create system directory nfs4 May 14 00:48:51.706508 kernel: Failed to create system directory nfs4 May 14 00:48:51.706523 kernel: Failed to create system directory nfs4 May 14 00:48:51.706537 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.707386 kernel: Failed to create system directory nfs4 May 14 00:48:51.707413 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.708247 kernel: Failed to create system directory nfs4 May 14 00:48:51.708277 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.709583 kernel: Failed to create system directory nfs4 May 14 00:48:51.709615 kernel: Failed to create system directory nfs4 May 14 00:48:51.709633 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.710489 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.711393 kernel: Failed to create system directory nfs4 May 14 00:48:51.711412 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.712329 kernel: Failed to create system directory nfs4 May 14 00:48:51.712356 kernel: Failed to create system directory nfs4 May 14 00:48:51.712372 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.713201 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.714494 kernel: Failed to create system directory nfs4 May 14 00:48:51.714519 kernel: Failed to create system directory nfs4 May 14 00:48:51.714538 kernel: Failed to create system directory nfs4 May 14 00:48:51.714555 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.715510 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.716410 kernel: Failed to create system directory nfs4 May 14 00:48:51.716431 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.717323 kernel: Failed to create system directory nfs4 May 14 00:48:51.717353 kernel: Failed to create system directory nfs4 May 14 00:48:51.717371 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.718242 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.719197 kernel: Failed to create system directory nfs4 May 14 00:48:51.719248 kernel: Failed to create system directory nfs4 May 14 00:48:51.719267 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.720191 kernel: Failed to create system directory nfs4 May 14 00:48:51.720220 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.721562 kernel: Failed to create system directory nfs4 May 14 00:48:51.721631 kernel: Failed to create system directory nfs4 May 14 00:48:51.721652 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.722490 kernel: Failed to create system directory nfs4 May 14 00:48:51.722535 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.723375 kernel: Failed to create system directory nfs4 May 14 00:48:51.723424 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.724414 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.725436 kernel: Failed to create system directory nfs4 May 14 00:48:51.725493 kernel: Failed to create system directory nfs4 May 14 00:48:51.725516 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.726422 kernel: Failed to create system directory nfs4 May 14 00:48:51.726456 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.727479 kernel: Failed to create system directory nfs4 May 14 00:48:51.727510 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.728441 kernel: Failed to create system directory nfs4 May 14 00:48:51.728472 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.729327 kernel: Failed to create system directory nfs4 May 14 00:48:51.729388 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.730305 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.731173 kernel: Failed to create system directory nfs4 May 14 00:48:51.731230 kernel: Failed to create system directory nfs4 May 14 00:48:51.731252 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.732481 kernel: Failed to create system directory nfs4 May 14 00:48:51.732507 kernel: Failed to create system directory nfs4 May 14 00:48:51.732521 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.733448 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.734400 kernel: Failed to create system directory nfs4 May 14 00:48:51.734422 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.735307 kernel: Failed to create system directory nfs4 May 14 00:48:51.735352 kernel: Failed to create system directory nfs4 May 14 00:48:51.735371 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.736182 kernel: Failed to create system directory nfs4 May 14 00:48:51.736248 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.737481 kernel: Failed to create system directory nfs4 May 14 00:48:51.737523 kernel: Failed to create system directory nfs4 May 14 00:48:51.737542 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.738355 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.739301 kernel: Failed to create system directory nfs4 May 14 00:48:51.739332 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.740170 kernel: Failed to create system directory nfs4 May 14 00:48:51.740212 kernel: Failed to create system directory nfs4 May 14 00:48:51.740230 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.741442 kernel: Failed to create system directory nfs4 May 14 00:48:51.741458 kernel: Failed to create system directory nfs4 May 14 00:48:51.741477 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.742312 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.743166 kernel: Failed to create system directory nfs4 May 14 00:48:51.743203 kernel: Failed to create system directory nfs4 May 14 00:48:51.743222 kernel: Failed to create system directory nfs4 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.694000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.744447 kernel: Failed to create system directory nfs4 May 14 00:48:51.744475 kernel: Failed to create system directory nfs4 May 14 00:48:51.848418 kernel: NFS: Registering the id_resolver key type May 14 00:48:51.848575 kernel: Key type id_resolver registered May 14 00:48:51.848604 kernel: Key type id_legacy registered May 14 00:48:51.694000 audit[3768]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa2e4a010 a1=19c694 a2=aaaac483e028 a3=aaaafa72a010 items=0 ppid=656 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.694000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.859587 kernel: Failed to create system directory rpcgss May 14 00:48:51.859676 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.860258 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.861300 kernel: Failed to create system directory rpcgss May 14 00:48:51.861380 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.862420 kernel: Failed to create system directory rpcgss May 14 00:48:51.862479 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.863528 kernel: Failed to create system directory rpcgss May 14 00:48:51.863608 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.864209 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.865209 kernel: Failed to create system directory rpcgss May 14 00:48:51.865273 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.866316 kernel: Failed to create system directory rpcgss May 14 00:48:51.866378 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.867413 kernel: Failed to create system directory rpcgss May 14 00:48:51.867470 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.868521 kernel: Failed to create system directory rpcgss May 14 00:48:51.868562 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.869235 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.870292 kernel: Failed to create system directory rpcgss May 14 00:48:51.870335 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.871388 kernel: Failed to create system directory rpcgss May 14 00:48:51.871462 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.872521 kernel: Failed to create system directory rpcgss May 14 00:48:51.872613 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.873225 kernel: Failed to create system directory rpcgss May 14 00:48:51.855000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:48:51.855000 audit[3769]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9b0f2010 a1=5ee7c a2=aaaac82de028 a3=aaaae84a2010 items=0 ppid=656 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.855000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 14 00:48:51.888744 nfsidmap[3777]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 14 00:48:51.891504 nfsidmap[3780]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 14 00:48:51.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd8554e0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.897000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 14 00:48:51.897000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd8554e0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.897000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 14 00:48:51.897000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 14 00:48:51.897000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd8554e0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:51.897000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 14 00:48:52.157210 env[1217]: time="2025-05-14T00:48:52.156731900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51,Namespace:default,Attempt:0,}" May 14 00:48:52.339470 systemd-networkd[1047]: cali5ec59c6bf6e: Link UP May 14 00:48:52.343177 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:48:52.343254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 14 00:48:52.343214 systemd-networkd[1047]: cali5ec59c6bf6e: Gained carrier May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.247 [INFO][3783] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.102-k8s-test--pod--1-eth0 default 8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51 1453 0 2025-05-14 00:48:33 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.102 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.248 [INFO][3783] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.292 [INFO][3798] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" HandleID="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Workload="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.307 [INFO][3798] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" HandleID="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Workload="10.0.0.102-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f37f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.102", "pod":"test-pod-1", "timestamp":"2025-05-14 00:48:52.292615465 +0000 UTC"}, Hostname:"10.0.0.102", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.307 [INFO][3798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.307 [INFO][3798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.307 [INFO][3798] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.102' May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.309 [INFO][3798] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.313 [INFO][3798] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.317 [INFO][3798] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.319 [INFO][3798] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.321 [INFO][3798] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.321 [INFO][3798] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.323 [INFO][3798] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9 May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.326 [INFO][3798] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.334 [INFO][3798] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.197/26] block=192.168.54.192/26 handle="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.334 [INFO][3798] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.197/26] handle="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" host="10.0.0.102" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.334 [INFO][3798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.334 [INFO][3798] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.197/26] IPv6=[] ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" HandleID="k8s-pod-network.c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Workload="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.350455 env[1217]: 2025-05-14 00:48:52.336 [INFO][3783] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51", ResourceVersion:"1453", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:52.351235 env[1217]: 2025-05-14 00:48:52.336 [INFO][3783] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.197/32] ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.351235 env[1217]: 2025-05-14 00:48:52.336 [INFO][3783] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.351235 env[1217]: 2025-05-14 00:48:52.340 [INFO][3783] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.351235 env[1217]: 2025-05-14 00:48:52.340 [INFO][3783] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.102-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51", ResourceVersion:"1453", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.102", ContainerID:"c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"be:81:ed:a4:2e:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:48:52.351235 env[1217]: 2025-05-14 00:48:52.347 [INFO][3783] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.102-k8s-test--pod--1-eth0" May 14 00:48:52.359000 audit[3813]: NETFILTER_CFG table=filter:113 family=2 entries=42 op=nft_register_chain pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:48:52.359000 audit[3813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20588 a0=3 a1=ffffd3a08e70 a2=0 a3=ffffad8d3fa8 items=0 ppid=3630 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.359000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:48:52.374592 env[1217]: time="2025-05-14T00:48:52.374526210Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:48:52.374592 env[1217]: time="2025-05-14T00:48:52.374565016Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:48:52.374592 env[1217]: time="2025-05-14T00:48:52.374575577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:48:52.374791 env[1217]: time="2025-05-14T00:48:52.374750882Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9 pid=3828 runtime=io.containerd.runc.v2 May 14 00:48:52.388439 systemd[1]: Started cri-containerd-c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9.scope. May 14 00:48:52.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.412000 audit: BPF prog-id=174 op=LOAD May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3828 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663534373763306262303661633966336566353461336465636662 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3828 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663534373763306262303661633966336566353461336465636662 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.413000 audit: BPF prog-id=175 op=LOAD May 14 00:48:52.413000 audit[3838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3828 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663534373763306262303661633966336566353461336465636662 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.415000 audit: BPF prog-id=176 op=LOAD May 14 00:48:52.415000 audit[3838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3828 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663534373763306262303661633966336566353461336465636662 May 14 00:48:52.416000 audit: BPF prog-id=176 op=UNLOAD May 14 00:48:52.416000 audit: BPF prog-id=175 op=UNLOAD May 14 00:48:52.416000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.416000 audit: BPF prog-id=177 op=LOAD May 14 00:48:52.416000 audit[3838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3828 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663534373763306262303661633966336566353461336465636662 May 14 00:48:52.418422 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:48:52.434575 env[1217]: time="2025-05-14T00:48:52.434515044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8aeb3d81-2fd0-4e94-8a2d-5a1275d4ed51,Namespace:default,Attempt:0,} returns sandbox id \"c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9\"" May 14 00:48:52.435620 env[1217]: time="2025-05-14T00:48:52.435584596Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 14 00:48:52.456939 kubelet[1454]: E0514 00:48:52.456894 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:52.675094 env[1217]: time="2025-05-14T00:48:52.674986973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:52.677739 env[1217]: time="2025-05-14T00:48:52.677698878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:52.679654 env[1217]: time="2025-05-14T00:48:52.679622431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:52.682207 env[1217]: time="2025-05-14T00:48:52.682179074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:48:52.682789 env[1217]: time="2025-05-14T00:48:52.682762996Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 14 00:48:52.685679 env[1217]: time="2025-05-14T00:48:52.685640965Z" level=info msg="CreateContainer within sandbox \"c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 14 00:48:52.697146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2554987836.mount: Deactivated successfully. May 14 00:48:52.697727 env[1217]: time="2025-05-14T00:48:52.697209167Z" level=info msg="CreateContainer within sandbox \"c1f5477c0bb06ac9f3ef54a3decfba6f28ea95e5573e5ef202b5ec6dbb8e92b9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d2c90dbc4e44d4db6c8d3b43953a0781827ae2e7626c90554d94f332f2dfc1fa\"" May 14 00:48:52.697967 env[1217]: time="2025-05-14T00:48:52.697938070Z" level=info msg="StartContainer for \"d2c90dbc4e44d4db6c8d3b43953a0781827ae2e7626c90554d94f332f2dfc1fa\"" May 14 00:48:52.712717 systemd[1]: Started cri-containerd-d2c90dbc4e44d4db6c8d3b43953a0781827ae2e7626c90554d94f332f2dfc1fa.scope. May 14 00:48:52.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.730000 audit: BPF prog-id=178 op=LOAD May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3828 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633930646263346534346434646236633864336234333935336130 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3828 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633930646263346534346434646236633864336234333935336130 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit: BPF prog-id=179 op=LOAD May 14 00:48:52.731000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3828 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633930646263346534346434646236633864336234333935336130 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit: BPF prog-id=180 op=LOAD May 14 00:48:52.731000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3828 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633930646263346534346434646236633864336234333935336130 May 14 00:48:52.731000 audit: BPF prog-id=180 op=UNLOAD May 14 00:48:52.731000 audit: BPF prog-id=179 op=UNLOAD May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:48:52.731000 audit: BPF prog-id=181 op=LOAD May 14 00:48:52.731000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3828 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:48:52.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633930646263346534346434646236633864336234333935336130 May 14 00:48:52.751912 env[1217]: time="2025-05-14T00:48:52.751864084Z" level=info msg="StartContainer for \"d2c90dbc4e44d4db6c8d3b43953a0781827ae2e7626c90554d94f332f2dfc1fa\" returns successfully" May 14 00:48:52.777906 kubelet[1454]: I0514 00:48:52.777849 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.528866235 podStartE2EDuration="19.777808446s" podCreationTimestamp="2025-05-14 00:48:33 +0000 UTC" firstStartedPulling="2025-05-14 00:48:52.435289194 +0000 UTC m=+53.917247844" lastFinishedPulling="2025-05-14 00:48:52.684231365 +0000 UTC m=+54.166190055" observedRunningTime="2025-05-14 00:48:52.777631701 +0000 UTC m=+54.259590351" watchObservedRunningTime="2025-05-14 00:48:52.777808446 +0000 UTC m=+54.259767096" May 14 00:48:53.421366 systemd-networkd[1047]: cali5ec59c6bf6e: Gained IPv6LL May 14 00:48:53.458041 kubelet[1454]: E0514 00:48:53.457994 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:54.459108 kubelet[1454]: E0514 00:48:54.459041 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 14 00:48:55.459548 kubelet[1454]: E0514 00:48:55.459498 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"