May 15 00:56:35.829060 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 00:56:35.829077 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:56:35.829086 kernel: BIOS-provided physical RAM map: May 15 00:56:35.829092 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:56:35.829097 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:56:35.829103 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:56:35.829109 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:56:35.829115 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:56:35.829120 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:56:35.829127 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:56:35.829133 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 00:56:35.829138 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:56:35.829143 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:56:35.829149 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:56:35.829156 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:56:35.829163 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:56:35.829169 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:56:35.829175 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:56:35.829181 kernel: NX (Execute Disable) protection: active May 15 00:56:35.829187 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:56:35.829193 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:56:35.829198 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:56:35.829204 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:56:35.829210 kernel: extended physical RAM map: May 15 00:56:35.829216 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:56:35.829223 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:56:35.829229 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:56:35.829235 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:56:35.829241 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:56:35.829246 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:56:35.829252 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:56:35.829258 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 00:56:35.829264 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 00:56:35.829270 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 00:56:35.829275 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 00:56:35.829281 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 00:56:35.829288 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:56:35.829294 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:56:35.829300 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:56:35.829306 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:56:35.829314 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:56:35.829322 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:56:35.829330 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:56:35.829340 kernel: efi: EFI v2.70 by EDK II May 15 00:56:35.829348 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 00:56:35.829357 kernel: random: crng init done May 15 00:56:35.829364 kernel: SMBIOS 2.8 present. May 15 00:56:35.829370 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 00:56:35.829377 kernel: Hypervisor detected: KVM May 15 00:56:35.829383 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 00:56:35.829389 kernel: kvm-clock: cpu 0, msr 6e196001, primary cpu clock May 15 00:56:35.829396 kernel: kvm-clock: using sched offset of 4011131904 cycles May 15 00:56:35.829404 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 00:56:35.829411 kernel: tsc: Detected 2794.746 MHz processor May 15 00:56:35.829418 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 00:56:35.829424 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 00:56:35.829431 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 00:56:35.829437 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 00:56:35.829444 kernel: Using GB pages for direct mapping May 15 00:56:35.829450 kernel: Secure boot disabled May 15 00:56:35.829457 kernel: ACPI: Early table checksum verification disabled May 15 00:56:35.829464 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 00:56:35.829471 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 00:56:35.829477 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829484 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829491 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 00:56:35.829497 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829504 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829510 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829517 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:56:35.829524 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 00:56:35.829543 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 00:56:35.829550 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 00:56:35.829556 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 00:56:35.829563 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 00:56:35.829569 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 00:56:35.829576 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 00:56:35.829582 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 00:56:35.829588 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 00:56:35.829596 kernel: No NUMA configuration found May 15 00:56:35.829603 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 00:56:35.829610 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 00:56:35.829616 kernel: Zone ranges: May 15 00:56:35.829623 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 00:56:35.829629 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 00:56:35.829636 kernel: Normal empty May 15 00:56:35.829642 kernel: Movable zone start for each node May 15 00:56:35.829656 kernel: Early memory node ranges May 15 00:56:35.829663 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 00:56:35.829670 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 00:56:35.829677 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 00:56:35.829683 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 00:56:35.829690 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 00:56:35.829696 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 00:56:35.829703 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 00:56:35.829709 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:56:35.829716 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 00:56:35.829722 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 00:56:35.829730 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:56:35.829736 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 00:56:35.829743 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 00:56:35.829749 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 00:56:35.829756 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 00:56:35.829762 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 00:56:35.829769 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 00:56:35.829775 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 00:56:35.829782 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 00:56:35.829789 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 00:56:35.829796 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 00:56:35.829802 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 00:56:35.829809 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 00:56:35.829815 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 00:56:35.829822 kernel: TSC deadline timer available May 15 00:56:35.829829 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 00:56:35.829835 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 00:56:35.829841 kernel: kvm-guest: setup PV sched yield May 15 00:56:35.829849 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 00:56:35.829856 kernel: Booting paravirtualized kernel on KVM May 15 00:56:35.829867 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 00:56:35.829875 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 00:56:35.829882 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 00:56:35.829888 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 00:56:35.829895 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 00:56:35.829902 kernel: kvm-guest: setup async PF for cpu 0 May 15 00:56:35.829908 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 00:56:35.829915 kernel: kvm-guest: PV spinlocks enabled May 15 00:56:35.829922 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 00:56:35.829929 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 00:56:35.829937 kernel: Policy zone: DMA32 May 15 00:56:35.829945 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:56:35.829952 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 00:56:35.829959 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 00:56:35.829967 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 00:56:35.829974 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 00:56:35.829981 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 15 00:56:35.829989 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 00:56:35.829995 kernel: ftrace: allocating 34584 entries in 136 pages May 15 00:56:35.830002 kernel: ftrace: allocated 136 pages with 2 groups May 15 00:56:35.830009 kernel: rcu: Hierarchical RCU implementation. May 15 00:56:35.830016 kernel: rcu: RCU event tracing is enabled. May 15 00:56:35.830023 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 00:56:35.830032 kernel: Rude variant of Tasks RCU enabled. May 15 00:56:35.830038 kernel: Tracing variant of Tasks RCU enabled. May 15 00:56:35.830045 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 00:56:35.830052 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 00:56:35.830059 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 00:56:35.830066 kernel: Console: colour dummy device 80x25 May 15 00:56:35.830073 kernel: printk: console [ttyS0] enabled May 15 00:56:35.830080 kernel: ACPI: Core revision 20210730 May 15 00:56:35.830087 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 00:56:35.830095 kernel: APIC: Switch to symmetric I/O mode setup May 15 00:56:35.830101 kernel: x2apic enabled May 15 00:56:35.830108 kernel: Switched APIC routing to physical x2apic. May 15 00:56:35.830115 kernel: kvm-guest: setup PV IPIs May 15 00:56:35.830122 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 00:56:35.830129 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 00:56:35.830136 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 15 00:56:35.830143 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 00:56:35.830149 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 00:56:35.830158 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 00:56:35.830164 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 00:56:35.830171 kernel: Spectre V2 : Mitigation: Retpolines May 15 00:56:35.830178 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 00:56:35.830185 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 00:56:35.830192 kernel: RETBleed: Mitigation: untrained return thunk May 15 00:56:35.830199 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 00:56:35.830206 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 00:56:35.830213 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 00:56:35.830221 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 00:56:35.830228 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 00:56:35.830235 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 00:56:35.830241 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 00:56:35.830248 kernel: Freeing SMP alternatives memory: 32K May 15 00:56:35.830255 kernel: pid_max: default: 32768 minimum: 301 May 15 00:56:35.830262 kernel: LSM: Security Framework initializing May 15 00:56:35.830269 kernel: SELinux: Initializing. May 15 00:56:35.830276 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:56:35.830284 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:56:35.830291 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 00:56:35.830298 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 00:56:35.830304 kernel: ... version: 0 May 15 00:56:35.830311 kernel: ... bit width: 48 May 15 00:56:35.830318 kernel: ... generic registers: 6 May 15 00:56:35.830325 kernel: ... value mask: 0000ffffffffffff May 15 00:56:35.830331 kernel: ... max period: 00007fffffffffff May 15 00:56:35.830338 kernel: ... fixed-purpose events: 0 May 15 00:56:35.830346 kernel: ... event mask: 000000000000003f May 15 00:56:35.830353 kernel: signal: max sigframe size: 1776 May 15 00:56:35.830360 kernel: rcu: Hierarchical SRCU implementation. May 15 00:56:35.830366 kernel: smp: Bringing up secondary CPUs ... May 15 00:56:35.830373 kernel: x86: Booting SMP configuration: May 15 00:56:35.830380 kernel: .... node #0, CPUs: #1 May 15 00:56:35.830387 kernel: kvm-clock: cpu 1, msr 6e196041, secondary cpu clock May 15 00:56:35.830393 kernel: kvm-guest: setup async PF for cpu 1 May 15 00:56:35.830400 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 00:56:35.830408 kernel: #2 May 15 00:56:35.830415 kernel: kvm-clock: cpu 2, msr 6e196081, secondary cpu clock May 15 00:56:35.830422 kernel: kvm-guest: setup async PF for cpu 2 May 15 00:56:35.830429 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 00:56:35.830435 kernel: #3 May 15 00:56:35.830442 kernel: kvm-clock: cpu 3, msr 6e1960c1, secondary cpu clock May 15 00:56:35.830449 kernel: kvm-guest: setup async PF for cpu 3 May 15 00:56:35.830455 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 00:56:35.830462 kernel: smp: Brought up 1 node, 4 CPUs May 15 00:56:35.830469 kernel: smpboot: Max logical packages: 1 May 15 00:56:35.830477 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 15 00:56:35.830484 kernel: devtmpfs: initialized May 15 00:56:35.830491 kernel: x86/mm: Memory block size: 128MB May 15 00:56:35.830498 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 00:56:35.830504 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 00:56:35.830511 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 00:56:35.830518 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 00:56:35.830525 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 00:56:35.830543 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 00:56:35.830550 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 00:56:35.830557 kernel: pinctrl core: initialized pinctrl subsystem May 15 00:56:35.830565 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 00:56:35.830573 kernel: audit: initializing netlink subsys (disabled) May 15 00:56:35.830581 kernel: audit: type=2000 audit(1747270596.089:1): state=initialized audit_enabled=0 res=1 May 15 00:56:35.830590 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 00:56:35.830600 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 00:56:35.830608 kernel: cpuidle: using governor menu May 15 00:56:35.830618 kernel: ACPI: bus type PCI registered May 15 00:56:35.830626 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 00:56:35.830633 kernel: dca service started, version 1.12.1 May 15 00:56:35.830640 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 00:56:35.830653 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 00:56:35.830660 kernel: PCI: Using configuration type 1 for base access May 15 00:56:35.830667 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 00:56:35.830679 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 00:56:35.830686 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 00:56:35.830694 kernel: ACPI: Added _OSI(Module Device) May 15 00:56:35.830701 kernel: ACPI: Added _OSI(Processor Device) May 15 00:56:35.830708 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 00:56:35.830715 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 00:56:35.830722 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 00:56:35.830729 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 00:56:35.830735 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 00:56:35.830743 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 00:56:35.830749 kernel: ACPI: Interpreter enabled May 15 00:56:35.830756 kernel: ACPI: PM: (supports S0 S3 S5) May 15 00:56:35.830765 kernel: ACPI: Using IOAPIC for interrupt routing May 15 00:56:35.830772 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 00:56:35.830778 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 00:56:35.830785 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 00:56:35.830893 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 00:56:35.830965 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 00:56:35.831032 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 00:56:35.831043 kernel: PCI host bridge to bus 0000:00 May 15 00:56:35.831116 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 00:56:35.831178 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 00:56:35.831237 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 00:56:35.831296 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 00:56:35.831355 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 00:56:35.831414 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 00:56:35.831477 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 00:56:35.831570 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 00:56:35.831661 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 00:56:35.831734 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 00:56:35.831839 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 00:56:35.831989 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 00:56:35.832111 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 00:56:35.832182 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 00:56:35.832259 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 00:56:35.832333 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 00:56:35.832402 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 00:56:35.832472 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 00:56:35.832568 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 00:56:35.832641 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 00:56:35.832721 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 00:56:35.832790 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 00:56:35.832868 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 00:56:35.832939 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 00:56:35.833006 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 00:56:35.833087 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 00:56:35.833161 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 00:56:35.833235 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 00:56:35.833302 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 00:56:35.833375 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 00:56:35.833442 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 00:56:35.833508 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 00:56:35.833595 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 00:56:35.833675 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 00:56:35.833684 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 00:56:35.833692 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 00:56:35.833699 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 00:56:35.833706 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 00:56:35.833713 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 00:56:35.833719 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 00:56:35.833726 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 00:56:35.833735 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 00:56:35.833742 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 00:56:35.833749 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 00:56:35.833756 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 00:56:35.833762 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 00:56:35.833769 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 00:56:35.833776 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 00:56:35.833783 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 00:56:35.833789 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 00:56:35.833798 kernel: iommu: Default domain type: Translated May 15 00:56:35.833805 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 00:56:35.833871 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 00:56:35.833938 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 00:56:35.834005 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 00:56:35.834014 kernel: vgaarb: loaded May 15 00:56:35.834021 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 00:56:35.834028 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 00:56:35.834038 kernel: PTP clock support registered May 15 00:56:35.834044 kernel: Registered efivars operations May 15 00:56:35.834051 kernel: PCI: Using ACPI for IRQ routing May 15 00:56:35.834058 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 00:56:35.834065 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 00:56:35.834072 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 00:56:35.834078 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 00:56:35.834085 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 00:56:35.834091 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 00:56:35.834098 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 00:56:35.834106 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 00:56:35.834113 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 00:56:35.834120 kernel: clocksource: Switched to clocksource kvm-clock May 15 00:56:35.834127 kernel: VFS: Disk quotas dquot_6.6.0 May 15 00:56:35.834134 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 00:56:35.834141 kernel: pnp: PnP ACPI init May 15 00:56:35.834218 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 00:56:35.834231 kernel: pnp: PnP ACPI: found 6 devices May 15 00:56:35.834238 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 00:56:35.834245 kernel: NET: Registered PF_INET protocol family May 15 00:56:35.834252 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 00:56:35.834259 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 00:56:35.834265 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 00:56:35.834272 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 00:56:35.834279 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 00:56:35.834286 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 00:56:35.834294 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:56:35.834301 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:56:35.834308 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 00:56:35.834315 kernel: NET: Registered PF_XDP protocol family May 15 00:56:35.834384 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 00:56:35.834453 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 00:56:35.834515 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 00:56:35.834588 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 00:56:35.834659 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 00:56:35.834721 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 00:56:35.834780 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 00:56:35.834838 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 00:56:35.834847 kernel: PCI: CLS 0 bytes, default 64 May 15 00:56:35.834854 kernel: Initialise system trusted keyrings May 15 00:56:35.834861 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 00:56:35.834868 kernel: Key type asymmetric registered May 15 00:56:35.834875 kernel: Asymmetric key parser 'x509' registered May 15 00:56:35.834884 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 00:56:35.834891 kernel: io scheduler mq-deadline registered May 15 00:56:35.834907 kernel: io scheduler kyber registered May 15 00:56:35.834915 kernel: io scheduler bfq registered May 15 00:56:35.834922 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 00:56:35.834930 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 00:56:35.834937 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 00:56:35.834945 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 00:56:35.834952 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 00:56:35.834960 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 00:56:35.834968 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 00:56:35.834975 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 00:56:35.834982 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 00:56:35.834989 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 00:56:35.835059 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 00:56:35.835123 kernel: rtc_cmos 00:04: registered as rtc0 May 15 00:56:35.835192 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T00:56:35 UTC (1747270595) May 15 00:56:35.835258 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 00:56:35.835267 kernel: efifb: probing for efifb May 15 00:56:35.835275 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 00:56:35.835282 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 00:56:35.835289 kernel: efifb: scrolling: redraw May 15 00:56:35.835297 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 00:56:35.835304 kernel: Console: switching to colour frame buffer device 160x50 May 15 00:56:35.835311 kernel: fb0: EFI VGA frame buffer device May 15 00:56:35.835318 kernel: pstore: Registered efi as persistent store backend May 15 00:56:35.835327 kernel: NET: Registered PF_INET6 protocol family May 15 00:56:35.835334 kernel: Segment Routing with IPv6 May 15 00:56:35.835342 kernel: In-situ OAM (IOAM) with IPv6 May 15 00:56:35.835351 kernel: NET: Registered PF_PACKET protocol family May 15 00:56:35.835359 kernel: Key type dns_resolver registered May 15 00:56:35.835367 kernel: IPI shorthand broadcast: enabled May 15 00:56:35.835374 kernel: sched_clock: Marking stable (526139714, 133041809)->(691677413, -32495890) May 15 00:56:35.835381 kernel: registered taskstats version 1 May 15 00:56:35.835389 kernel: Loading compiled-in X.509 certificates May 15 00:56:35.835396 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 00:56:35.835403 kernel: Key type .fscrypt registered May 15 00:56:35.835411 kernel: Key type fscrypt-provisioning registered May 15 00:56:35.835418 kernel: pstore: Using crash dump compression: deflate May 15 00:56:35.835425 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 00:56:35.835434 kernel: ima: Allocated hash algorithm: sha1 May 15 00:56:35.835441 kernel: ima: No architecture policies found May 15 00:56:35.835448 kernel: clk: Disabling unused clocks May 15 00:56:35.835456 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 00:56:35.835463 kernel: Write protecting the kernel read-only data: 28672k May 15 00:56:35.835471 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 00:56:35.835478 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 00:56:35.835485 kernel: Run /init as init process May 15 00:56:35.835492 kernel: with arguments: May 15 00:56:35.835501 kernel: /init May 15 00:56:35.835508 kernel: with environment: May 15 00:56:35.835515 kernel: HOME=/ May 15 00:56:35.835522 kernel: TERM=linux May 15 00:56:35.835544 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 00:56:35.835553 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:56:35.835563 systemd[1]: Detected virtualization kvm. May 15 00:56:35.835571 systemd[1]: Detected architecture x86-64. May 15 00:56:35.835580 systemd[1]: Running in initrd. May 15 00:56:35.835587 systemd[1]: No hostname configured, using default hostname. May 15 00:56:35.835595 systemd[1]: Hostname set to . May 15 00:56:35.835602 systemd[1]: Initializing machine ID from VM UUID. May 15 00:56:35.835610 systemd[1]: Queued start job for default target initrd.target. May 15 00:56:35.835617 systemd[1]: Started systemd-ask-password-console.path. May 15 00:56:35.835625 systemd[1]: Reached target cryptsetup.target. May 15 00:56:35.835632 systemd[1]: Reached target paths.target. May 15 00:56:35.835642 systemd[1]: Reached target slices.target. May 15 00:56:35.835656 systemd[1]: Reached target swap.target. May 15 00:56:35.835664 systemd[1]: Reached target timers.target. May 15 00:56:35.835673 systemd[1]: Listening on iscsid.socket. May 15 00:56:35.835680 systemd[1]: Listening on iscsiuio.socket. May 15 00:56:35.835688 systemd[1]: Listening on systemd-journald-audit.socket. May 15 00:56:35.835696 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 00:56:35.835704 systemd[1]: Listening on systemd-journald.socket. May 15 00:56:35.835713 systemd[1]: Listening on systemd-networkd.socket. May 15 00:56:35.835720 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:56:35.835728 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:56:35.835736 systemd[1]: Reached target sockets.target. May 15 00:56:35.835744 systemd[1]: Starting kmod-static-nodes.service... May 15 00:56:35.835751 systemd[1]: Finished network-cleanup.service. May 15 00:56:35.835759 systemd[1]: Starting systemd-fsck-usr.service... May 15 00:56:35.835767 systemd[1]: Starting systemd-journald.service... May 15 00:56:35.835774 systemd[1]: Starting systemd-modules-load.service... May 15 00:56:35.835783 systemd[1]: Starting systemd-resolved.service... May 15 00:56:35.835791 systemd[1]: Starting systemd-vconsole-setup.service... May 15 00:56:35.835798 systemd[1]: Finished kmod-static-nodes.service. May 15 00:56:35.835806 kernel: audit: type=1130 audit(1747270595.827:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.835813 systemd[1]: Finished systemd-fsck-usr.service. May 15 00:56:35.835821 kernel: audit: type=1130 audit(1747270595.833:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.835831 systemd-journald[198]: Journal started May 15 00:56:35.835870 systemd-journald[198]: Runtime Journal (/run/log/journal/d0ee3562eccd49ea909cfc5ad19783a7) is 6.0M, max 48.4M, 42.4M free. May 15 00:56:35.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.833053 systemd-modules-load[199]: Inserted module 'overlay' May 15 00:56:35.842554 systemd[1]: Started systemd-journald.service. May 15 00:56:35.842570 kernel: audit: type=1130 audit(1747270595.837:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.838669 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 00:56:35.846087 systemd[1]: Finished systemd-vconsole-setup.service. May 15 00:56:35.850873 kernel: audit: type=1130 audit(1747270595.846:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.850272 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 00:56:35.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.855226 systemd[1]: Starting dracut-cmdline-ask.service... May 15 00:56:35.855838 kernel: audit: type=1130 audit(1747270595.851:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.866264 systemd[1]: Finished dracut-cmdline-ask.service. May 15 00:56:35.872718 kernel: audit: type=1130 audit(1747270595.865:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.872734 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 00:56:35.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.866811 systemd[1]: Starting dracut-cmdline.service... May 15 00:56:35.876277 dracut-cmdline[214]: dracut-dracut-053 May 15 00:56:35.877716 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:56:35.882637 kernel: Bridge firewalling registered May 15 00:56:35.878055 systemd-modules-load[199]: Inserted module 'br_netfilter' May 15 00:56:35.885422 systemd-resolved[200]: Positive Trust Anchors: May 15 00:56:35.886408 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:56:35.886441 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:56:35.895183 systemd-resolved[200]: Defaulting to hostname 'linux'. May 15 00:56:35.896811 systemd[1]: Started systemd-resolved.service. May 15 00:56:35.902063 kernel: audit: type=1130 audit(1747270595.897:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.897686 systemd[1]: Reached target nss-lookup.target. May 15 00:56:35.904547 kernel: SCSI subsystem initialized May 15 00:56:35.916555 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 00:56:35.916595 kernel: device-mapper: uevent: version 1.0.3 May 15 00:56:35.916605 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 00:56:35.919200 systemd-modules-load[199]: Inserted module 'dm_multipath' May 15 00:56:35.920266 systemd[1]: Finished systemd-modules-load.service. May 15 00:56:35.924871 kernel: audit: type=1130 audit(1747270595.919:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.924836 systemd[1]: Starting systemd-sysctl.service... May 15 00:56:35.931457 systemd[1]: Finished systemd-sysctl.service. May 15 00:56:35.935857 kernel: audit: type=1130 audit(1747270595.931:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:35.941547 kernel: Loading iSCSI transport class v2.0-870. May 15 00:56:35.956554 kernel: iscsi: registered transport (tcp) May 15 00:56:35.977652 kernel: iscsi: registered transport (qla4xxx) May 15 00:56:35.977683 kernel: QLogic iSCSI HBA Driver May 15 00:56:36.005797 systemd[1]: Finished dracut-cmdline.service. May 15 00:56:36.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:36.007321 systemd[1]: Starting dracut-pre-udev.service... May 15 00:56:36.052560 kernel: raid6: avx2x4 gen() 29668 MB/s May 15 00:56:36.069547 kernel: raid6: avx2x4 xor() 7433 MB/s May 15 00:56:36.086550 kernel: raid6: avx2x2 gen() 32024 MB/s May 15 00:56:36.103547 kernel: raid6: avx2x2 xor() 19243 MB/s May 15 00:56:36.120547 kernel: raid6: avx2x1 gen() 26499 MB/s May 15 00:56:36.137548 kernel: raid6: avx2x1 xor() 15333 MB/s May 15 00:56:36.154548 kernel: raid6: sse2x4 gen() 14661 MB/s May 15 00:56:36.171547 kernel: raid6: sse2x4 xor() 7206 MB/s May 15 00:56:36.188548 kernel: raid6: sse2x2 gen() 16429 MB/s May 15 00:56:36.205549 kernel: raid6: sse2x2 xor() 9831 MB/s May 15 00:56:36.222550 kernel: raid6: sse2x1 gen() 11837 MB/s May 15 00:56:36.239942 kernel: raid6: sse2x1 xor() 7809 MB/s May 15 00:56:36.239959 kernel: raid6: using algorithm avx2x2 gen() 32024 MB/s May 15 00:56:36.239969 kernel: raid6: .... xor() 19243 MB/s, rmw enabled May 15 00:56:36.240663 kernel: raid6: using avx2x2 recovery algorithm May 15 00:56:36.252556 kernel: xor: automatically using best checksumming function avx May 15 00:56:36.342560 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 00:56:36.350993 systemd[1]: Finished dracut-pre-udev.service. May 15 00:56:36.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:36.352000 audit: BPF prog-id=7 op=LOAD May 15 00:56:36.352000 audit: BPF prog-id=8 op=LOAD May 15 00:56:36.353116 systemd[1]: Starting systemd-udevd.service... May 15 00:56:36.365854 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 15 00:56:36.370879 systemd[1]: Started systemd-udevd.service. May 15 00:56:36.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:36.371731 systemd[1]: Starting dracut-pre-trigger.service... May 15 00:56:36.382188 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation May 15 00:56:36.406470 systemd[1]: Finished dracut-pre-trigger.service. May 15 00:56:36.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:36.409136 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:56:36.447569 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:56:36.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:36.479689 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 00:56:36.485831 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 00:56:36.485855 kernel: GPT:9289727 != 19775487 May 15 00:56:36.485867 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 00:56:36.485880 kernel: GPT:9289727 != 19775487 May 15 00:56:36.485891 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 00:56:36.485903 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:56:36.485915 kernel: cryptd: max_cpu_qlen set to 1000 May 15 00:56:36.503771 kernel: AVX2 version of gcm_enc/dec engaged. May 15 00:56:36.503805 kernel: AES CTR mode by8 optimization enabled May 15 00:56:36.506552 kernel: libata version 3.00 loaded. May 15 00:56:36.518213 kernel: ahci 0000:00:1f.2: version 3.0 May 15 00:56:36.560151 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 00:56:36.560171 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 00:56:36.560287 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 00:56:36.560388 kernel: scsi host0: ahci May 15 00:56:36.560510 kernel: scsi host1: ahci May 15 00:56:36.560654 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (436) May 15 00:56:36.560668 kernel: scsi host2: ahci May 15 00:56:36.560784 kernel: scsi host3: ahci May 15 00:56:36.560897 kernel: scsi host4: ahci May 15 00:56:36.561015 kernel: scsi host5: ahci May 15 00:56:36.561124 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 15 00:56:36.561137 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 15 00:56:36.561149 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 15 00:56:36.561160 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 15 00:56:36.561175 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 15 00:56:36.561186 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 15 00:56:36.532977 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 00:56:36.546750 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 00:56:36.559141 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 00:56:36.571307 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 00:56:36.576588 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:56:36.580123 systemd[1]: Starting disk-uuid.service... May 15 00:56:36.591959 disk-uuid[534]: Primary Header is updated. May 15 00:56:36.591959 disk-uuid[534]: Secondary Entries is updated. May 15 00:56:36.591959 disk-uuid[534]: Secondary Header is updated. May 15 00:56:36.596194 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:56:36.598558 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:56:36.868584 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 00:56:36.868654 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 00:56:36.876550 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 00:56:36.876572 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 00:56:36.877562 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 00:56:36.878562 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 00:56:36.879978 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 00:56:36.880051 kernel: ata3.00: applying bridge limits May 15 00:56:36.881548 kernel: ata3.00: configured for UDMA/100 May 15 00:56:36.881569 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 00:56:36.911577 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 00:56:36.929180 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 00:56:36.929197 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 00:56:37.616439 disk-uuid[535]: The operation has completed successfully. May 15 00:56:37.617758 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:56:37.641705 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 00:56:37.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.641786 systemd[1]: Finished disk-uuid.service. May 15 00:56:37.646757 systemd[1]: Starting verity-setup.service... May 15 00:56:37.660558 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 00:56:37.681317 systemd[1]: Found device dev-mapper-usr.device. May 15 00:56:37.685101 systemd[1]: Mounting sysusr-usr.mount... May 15 00:56:37.687183 systemd[1]: Finished verity-setup.service. May 15 00:56:37.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.750560 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 00:56:37.750921 systemd[1]: Mounted sysusr-usr.mount. May 15 00:56:37.751126 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 00:56:37.752332 systemd[1]: Starting ignition-setup.service... May 15 00:56:37.752982 systemd[1]: Starting parse-ip-for-networkd.service... May 15 00:56:37.765877 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:56:37.765903 kernel: BTRFS info (device vda6): using free space tree May 15 00:56:37.765917 kernel: BTRFS info (device vda6): has skinny extents May 15 00:56:37.774792 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 00:56:37.819120 systemd[1]: Finished parse-ip-for-networkd.service. May 15 00:56:37.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.821000 audit: BPF prog-id=9 op=LOAD May 15 00:56:37.822218 systemd[1]: Starting systemd-networkd.service... May 15 00:56:37.842329 systemd-networkd[707]: lo: Link UP May 15 00:56:37.842340 systemd-networkd[707]: lo: Gained carrier May 15 00:56:37.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.842742 systemd-networkd[707]: Enumeration completed May 15 00:56:37.842815 systemd[1]: Started systemd-networkd.service. May 15 00:56:37.842931 systemd-networkd[707]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:56:37.844406 systemd[1]: Reached target network.target. May 15 00:56:37.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.844803 systemd-networkd[707]: eth0: Link UP May 15 00:56:37.844806 systemd-networkd[707]: eth0: Gained carrier May 15 00:56:37.845914 systemd[1]: Starting iscsiuio.service... May 15 00:56:37.849784 systemd[1]: Started iscsiuio.service. May 15 00:56:37.865685 iscsid[712]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 00:56:37.865685 iscsid[712]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 00:56:37.865685 iscsid[712]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 00:56:37.865685 iscsid[712]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 00:56:37.865685 iscsid[712]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 00:56:37.865685 iscsid[712]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 00:56:37.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.851464 systemd[1]: Starting iscsid.service... May 15 00:56:37.855490 systemd[1]: Started iscsid.service. May 15 00:56:37.866376 systemd[1]: Starting dracut-initqueue.service... May 15 00:56:37.866642 systemd-networkd[707]: eth0: DHCPv4 address 10.0.0.130/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:56:37.877114 systemd[1]: Finished dracut-initqueue.service. May 15 00:56:37.878216 systemd[1]: Reached target remote-fs-pre.target. May 15 00:56:37.880364 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:56:37.882066 systemd[1]: Reached target remote-fs.target. May 15 00:56:37.889317 systemd[1]: Starting dracut-pre-mount.service... May 15 00:56:37.897369 systemd[1]: Finished dracut-pre-mount.service. May 15 00:56:37.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.982173 systemd[1]: Finished ignition-setup.service. May 15 00:56:37.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:37.984714 systemd[1]: Starting ignition-fetch-offline.service... May 15 00:56:38.020441 ignition[727]: Ignition 2.14.0 May 15 00:56:38.020451 ignition[727]: Stage: fetch-offline May 15 00:56:38.020500 ignition[727]: no configs at "/usr/lib/ignition/base.d" May 15 00:56:38.020508 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:38.020635 ignition[727]: parsed url from cmdline: "" May 15 00:56:38.020638 ignition[727]: no config URL provided May 15 00:56:38.020643 ignition[727]: reading system config file "/usr/lib/ignition/user.ign" May 15 00:56:38.020650 ignition[727]: no config at "/usr/lib/ignition/user.ign" May 15 00:56:38.020667 ignition[727]: op(1): [started] loading QEMU firmware config module May 15 00:56:38.020671 ignition[727]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 00:56:38.037889 ignition[727]: op(1): [finished] loading QEMU firmware config module May 15 00:56:38.039337 ignition[727]: parsing config with SHA512: 50b639f7d0f310463aaa9f908efdb17aacf5c42d6801d1c3f11c942d019e4cfdeb3c213aa07c98968ae1528d3afcede633d2424a80a4b4b7545d7cfde4f21517 May 15 00:56:38.042194 unknown[727]: fetched base config from "system" May 15 00:56:38.042205 unknown[727]: fetched user config from "qemu" May 15 00:56:38.042479 ignition[727]: fetch-offline: fetch-offline passed May 15 00:56:38.044315 systemd[1]: Finished ignition-fetch-offline.service. May 15 00:56:38.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.042544 ignition[727]: Ignition finished successfully May 15 00:56:38.046052 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 00:56:38.046754 systemd[1]: Starting ignition-kargs.service... May 15 00:56:38.055553 ignition[735]: Ignition 2.14.0 May 15 00:56:38.055563 ignition[735]: Stage: kargs May 15 00:56:38.055652 ignition[735]: no configs at "/usr/lib/ignition/base.d" May 15 00:56:38.055661 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:38.058111 systemd[1]: Finished ignition-kargs.service. May 15 00:56:38.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.056317 ignition[735]: kargs: kargs passed May 15 00:56:38.060649 systemd[1]: Starting ignition-disks.service... May 15 00:56:38.056353 ignition[735]: Ignition finished successfully May 15 00:56:38.067344 ignition[741]: Ignition 2.14.0 May 15 00:56:38.067355 ignition[741]: Stage: disks May 15 00:56:38.067461 ignition[741]: no configs at "/usr/lib/ignition/base.d" May 15 00:56:38.067472 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:38.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.069184 systemd[1]: Finished ignition-disks.service. May 15 00:56:38.068352 ignition[741]: disks: disks passed May 15 00:56:38.070658 systemd[1]: Reached target initrd-root-device.target. May 15 00:56:38.068400 ignition[741]: Ignition finished successfully May 15 00:56:38.072501 systemd[1]: Reached target local-fs-pre.target. May 15 00:56:38.073368 systemd[1]: Reached target local-fs.target. May 15 00:56:38.074937 systemd[1]: Reached target sysinit.target. May 15 00:56:38.075743 systemd[1]: Reached target basic.target. May 15 00:56:38.077903 systemd[1]: Starting systemd-fsck-root.service... May 15 00:56:38.087123 systemd-fsck[749]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 15 00:56:38.298984 systemd[1]: Finished systemd-fsck-root.service. May 15 00:56:38.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.301057 systemd[1]: Mounting sysroot.mount... May 15 00:56:38.312569 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 00:56:38.313008 systemd[1]: Mounted sysroot.mount. May 15 00:56:38.314555 systemd[1]: Reached target initrd-root-fs.target. May 15 00:56:38.317267 systemd[1]: Mounting sysroot-usr.mount... May 15 00:56:38.319122 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 00:56:38.319162 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 00:56:38.319183 systemd[1]: Reached target ignition-diskful.target. May 15 00:56:38.324810 systemd[1]: Mounted sysroot-usr.mount. May 15 00:56:38.326958 systemd[1]: Starting initrd-setup-root.service... May 15 00:56:38.331722 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory May 15 00:56:38.336029 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory May 15 00:56:38.339402 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory May 15 00:56:38.343509 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory May 15 00:56:38.369899 systemd[1]: Finished initrd-setup-root.service. May 15 00:56:38.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.377334 systemd[1]: Starting ignition-mount.service... May 15 00:56:38.379550 systemd[1]: Starting sysroot-boot.service... May 15 00:56:38.382306 bash[800]: umount: /sysroot/usr/share/oem: not mounted. May 15 00:56:38.389147 ignition[801]: INFO : Ignition 2.14.0 May 15 00:56:38.389147 ignition[801]: INFO : Stage: mount May 15 00:56:38.390960 ignition[801]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:56:38.390960 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:38.390960 ignition[801]: INFO : mount: mount passed May 15 00:56:38.390960 ignition[801]: INFO : Ignition finished successfully May 15 00:56:38.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.392117 systemd[1]: Finished ignition-mount.service. May 15 00:56:38.398880 systemd[1]: Finished sysroot-boot.service. May 15 00:56:38.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:38.694450 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 00:56:38.701547 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (810) May 15 00:56:38.703643 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:56:38.703664 kernel: BTRFS info (device vda6): using free space tree May 15 00:56:38.703674 kernel: BTRFS info (device vda6): has skinny extents May 15 00:56:38.707458 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 00:56:38.709073 systemd[1]: Starting ignition-files.service... May 15 00:56:38.724140 ignition[830]: INFO : Ignition 2.14.0 May 15 00:56:38.724140 ignition[830]: INFO : Stage: files May 15 00:56:38.725945 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:56:38.725945 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:38.725945 ignition[830]: DEBUG : files: compiled without relabeling support, skipping May 15 00:56:38.729692 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 00:56:38.729692 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 00:56:38.733870 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 00:56:38.735302 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 00:56:38.737004 unknown[830]: wrote ssh authorized keys file for user: core May 15 00:56:38.738111 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:56:38.738111 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 15 00:56:39.037746 systemd-networkd[707]: eth0: Gained IPv6LL May 15 00:56:39.088576 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 00:56:39.472995 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:56:39.472995 ignition[830]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 15 00:56:39.476450 ignition[830]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:56:39.478397 ignition[830]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:56:39.480284 ignition[830]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 15 00:56:39.480284 ignition[830]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 15 00:56:39.480284 ignition[830]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:56:39.502701 ignition[830]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:56:39.504396 ignition[830]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 15 00:56:39.505865 ignition[830]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 00:56:39.507737 ignition[830]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 00:56:39.507737 ignition[830]: INFO : files: files passed May 15 00:56:39.507737 ignition[830]: INFO : Ignition finished successfully May 15 00:56:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.508150 systemd[1]: Finished ignition-files.service. May 15 00:56:39.512110 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 00:56:39.512924 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 00:56:39.513627 systemd[1]: Starting ignition-quench.service... May 15 00:56:39.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.516758 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 00:56:39.516853 systemd[1]: Finished ignition-quench.service. May 15 00:56:39.524083 initrd-setup-root-after-ignition[855]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 00:56:39.527056 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 00:56:39.528983 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 00:56:39.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.530952 systemd[1]: Reached target ignition-complete.target. May 15 00:56:39.532692 systemd[1]: Starting initrd-parse-etc.service... May 15 00:56:39.547324 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 00:56:39.547439 systemd[1]: Finished initrd-parse-etc.service. May 15 00:56:39.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.549993 systemd[1]: Reached target initrd-fs.target. May 15 00:56:39.550073 systemd[1]: Reached target initrd.target. May 15 00:56:39.551598 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 00:56:39.552342 systemd[1]: Starting dracut-pre-pivot.service... May 15 00:56:39.561892 systemd[1]: Finished dracut-pre-pivot.service. May 15 00:56:39.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.564290 systemd[1]: Starting initrd-cleanup.service... May 15 00:56:39.574683 systemd[1]: Stopped target nss-lookup.target. May 15 00:56:39.574866 systemd[1]: Stopped target remote-cryptsetup.target. May 15 00:56:39.576389 systemd[1]: Stopped target timers.target. May 15 00:56:39.578001 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 00:56:39.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.578136 systemd[1]: Stopped dracut-pre-pivot.service. May 15 00:56:39.579494 systemd[1]: Stopped target initrd.target. May 15 00:56:39.581770 systemd[1]: Stopped target basic.target. May 15 00:56:39.583900 systemd[1]: Stopped target ignition-complete.target. May 15 00:56:39.584665 systemd[1]: Stopped target ignition-diskful.target. May 15 00:56:39.586979 systemd[1]: Stopped target initrd-root-device.target. May 15 00:56:39.589422 systemd[1]: Stopped target remote-fs.target. May 15 00:56:39.589601 systemd[1]: Stopped target remote-fs-pre.target. May 15 00:56:39.591056 systemd[1]: Stopped target sysinit.target. May 15 00:56:39.591406 systemd[1]: Stopped target local-fs.target. May 15 00:56:39.593938 systemd[1]: Stopped target local-fs-pre.target. May 15 00:56:39.594269 systemd[1]: Stopped target swap.target. May 15 00:56:39.596738 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 00:56:39.596874 systemd[1]: Stopped dracut-pre-mount.service. May 15 00:56:39.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.599800 systemd[1]: Stopped target cryptsetup.target. May 15 00:56:39.601223 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 00:56:39.601338 systemd[1]: Stopped dracut-initqueue.service. May 15 00:56:39.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.603717 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 00:56:39.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.603849 systemd[1]: Stopped ignition-fetch-offline.service. May 15 00:56:39.604522 systemd[1]: Stopped target paths.target. May 15 00:56:39.606898 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 00:56:39.610599 systemd[1]: Stopped systemd-ask-password-console.path. May 15 00:56:39.612407 systemd[1]: Stopped target slices.target. May 15 00:56:39.612608 systemd[1]: Stopped target sockets.target. May 15 00:56:39.614013 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 00:56:39.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.614157 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 00:56:39.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.615455 systemd[1]: ignition-files.service: Deactivated successfully. May 15 00:56:39.615596 systemd[1]: Stopped ignition-files.service. May 15 00:56:39.619207 systemd[1]: Stopping ignition-mount.service... May 15 00:56:39.622736 iscsid[712]: iscsid shutting down. May 15 00:56:39.620282 systemd[1]: Stopping iscsid.service... May 15 00:56:39.623196 systemd[1]: Stopping sysroot-boot.service... May 15 00:56:39.626230 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 00:56:39.626363 systemd[1]: Stopped systemd-udev-trigger.service. May 15 00:56:39.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.628304 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 00:56:39.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.628385 systemd[1]: Stopped dracut-pre-trigger.service. May 15 00:56:39.631231 systemd[1]: iscsid.service: Deactivated successfully. May 15 00:56:39.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.631317 systemd[1]: Stopped iscsid.service. May 15 00:56:39.632882 systemd[1]: iscsid.socket: Deactivated successfully. May 15 00:56:39.632943 systemd[1]: Closed iscsid.socket. May 15 00:56:39.635030 systemd[1]: Stopping iscsiuio.service... May 15 00:56:39.637428 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 00:56:39.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.637908 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 00:56:39.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.637988 systemd[1]: Finished initrd-cleanup.service. May 15 00:56:39.639707 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 00:56:39.639778 systemd[1]: Stopped iscsiuio.service. May 15 00:56:39.641912 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 00:56:39.641936 systemd[1]: Closed iscsiuio.socket. May 15 00:56:39.650571 ignition[870]: INFO : Ignition 2.14.0 May 15 00:56:39.650571 ignition[870]: INFO : Stage: umount May 15 00:56:39.653779 ignition[870]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:56:39.653779 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:56:39.653779 ignition[870]: INFO : umount: umount passed May 15 00:56:39.653779 ignition[870]: INFO : Ignition finished successfully May 15 00:56:39.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.653234 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 00:56:39.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.653358 systemd[1]: Stopped ignition-mount.service. May 15 00:56:39.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.655660 systemd[1]: Stopped target network.target. May 15 00:56:39.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.658180 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 00:56:39.658235 systemd[1]: Stopped ignition-disks.service. May 15 00:56:39.659919 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 00:56:39.659963 systemd[1]: Stopped ignition-kargs.service. May 15 00:56:39.661677 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 00:56:39.661724 systemd[1]: Stopped ignition-setup.service. May 15 00:56:39.663311 systemd[1]: Stopping systemd-networkd.service... May 15 00:56:39.664824 systemd[1]: Stopping systemd-resolved.service... May 15 00:56:39.674323 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 00:56:39.674426 systemd[1]: Stopped systemd-resolved.service. May 15 00:56:39.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.681605 systemd-networkd[707]: eth0: DHCPv6 lease lost May 15 00:56:39.681000 audit: BPF prog-id=6 op=UNLOAD May 15 00:56:39.682726 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 00:56:39.683716 systemd[1]: Stopped systemd-networkd.service. May 15 00:56:39.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.685879 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 00:56:39.685910 systemd[1]: Closed systemd-networkd.socket. May 15 00:56:39.688000 audit: BPF prog-id=9 op=UNLOAD May 15 00:56:39.689067 systemd[1]: Stopping network-cleanup.service... May 15 00:56:39.690627 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 00:56:39.690666 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 00:56:39.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.693443 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 00:56:39.693474 systemd[1]: Stopped systemd-sysctl.service. May 15 00:56:39.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.695333 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 00:56:39.696088 systemd[1]: Stopped systemd-modules-load.service. May 15 00:56:39.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.698790 systemd[1]: Stopping systemd-udevd.service... May 15 00:56:39.701237 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 00:56:39.701702 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 00:56:39.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.701776 systemd[1]: Stopped sysroot-boot.service. May 15 00:56:39.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.704647 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 00:56:39.704704 systemd[1]: Stopped initrd-setup-root.service. May 15 00:56:39.705995 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 00:56:39.706099 systemd[1]: Stopped network-cleanup.service. May 15 00:56:39.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.709369 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 00:56:39.709509 systemd[1]: Stopped systemd-udevd.service. May 15 00:56:39.711679 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 00:56:39.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.711715 systemd[1]: Closed systemd-udevd-control.socket. May 15 00:56:39.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.712740 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 00:56:39.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.712788 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 00:56:39.714511 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 00:56:39.714556 systemd[1]: Stopped dracut-pre-udev.service. May 15 00:56:39.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:39.716063 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 00:56:39.716092 systemd[1]: Stopped dracut-cmdline.service. May 15 00:56:39.717868 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 00:56:39.717897 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 00:56:39.719337 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 00:56:39.720261 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 00:56:39.720297 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 00:56:39.722205 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 00:56:39.722238 systemd[1]: Stopped kmod-static-nodes.service. May 15 00:56:39.723075 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 00:56:39.723105 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 00:56:39.724695 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 00:56:39.725019 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 00:56:39.725081 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 00:56:39.726789 systemd[1]: Reached target initrd-switch-root.target. May 15 00:56:39.728940 systemd[1]: Starting initrd-switch-root.service... May 15 00:56:39.744518 systemd[1]: Switching root. May 15 00:56:39.763225 systemd-journald[198]: Journal stopped May 15 00:56:42.338322 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 15 00:56:42.338369 kernel: SELinux: Class mctp_socket not defined in policy. May 15 00:56:42.338384 kernel: SELinux: Class anon_inode not defined in policy. May 15 00:56:42.338394 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 00:56:42.338403 kernel: SELinux: policy capability network_peer_controls=1 May 15 00:56:42.338416 kernel: SELinux: policy capability open_perms=1 May 15 00:56:42.338425 kernel: SELinux: policy capability extended_socket_class=1 May 15 00:56:42.338434 kernel: SELinux: policy capability always_check_network=0 May 15 00:56:42.338443 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 00:56:42.338456 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 00:56:42.338465 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 00:56:42.338474 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 00:56:42.338486 systemd[1]: Successfully loaded SELinux policy in 38.251ms. May 15 00:56:42.338503 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.932ms. May 15 00:56:42.338514 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:56:42.338524 systemd[1]: Detected virtualization kvm. May 15 00:56:42.338554 systemd[1]: Detected architecture x86-64. May 15 00:56:42.338564 systemd[1]: Detected first boot. May 15 00:56:42.338576 systemd[1]: Initializing machine ID from VM UUID. May 15 00:56:42.338586 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 00:56:42.338595 systemd[1]: Populated /etc with preset unit settings. May 15 00:56:42.338605 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:56:42.338616 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:56:42.338630 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:56:42.338641 kernel: kauditd_printk_skb: 83 callbacks suppressed May 15 00:56:42.338651 kernel: audit: type=1334 audit(1747270602.163:87): prog-id=12 op=LOAD May 15 00:56:42.338660 kernel: audit: type=1334 audit(1747270602.163:88): prog-id=3 op=UNLOAD May 15 00:56:42.338669 kernel: audit: type=1334 audit(1747270602.175:89): prog-id=13 op=LOAD May 15 00:56:42.338678 kernel: audit: type=1334 audit(1747270602.176:90): prog-id=14 op=LOAD May 15 00:56:42.338687 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 00:56:42.338697 kernel: audit: type=1334 audit(1747270602.176:91): prog-id=4 op=UNLOAD May 15 00:56:42.338706 systemd[1]: Stopped initrd-switch-root.service. May 15 00:56:42.338715 kernel: audit: type=1334 audit(1747270602.176:92): prog-id=5 op=UNLOAD May 15 00:56:42.338726 kernel: audit: type=1131 audit(1747270602.177:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.338736 kernel: audit: type=1130 audit(1747270602.188:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.338746 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 00:56:42.338756 kernel: audit: type=1131 audit(1747270602.188:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.338766 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 00:56:42.338775 systemd[1]: Created slice system-addon\x2drun.slice. May 15 00:56:42.338787 systemd[1]: Created slice system-getty.slice. May 15 00:56:42.338797 systemd[1]: Created slice system-modprobe.slice. May 15 00:56:42.338806 kernel: audit: type=1334 audit(1747270602.205:96): prog-id=12 op=UNLOAD May 15 00:56:42.338816 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 00:56:42.338826 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 00:56:42.338836 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 00:56:42.338846 systemd[1]: Created slice user.slice. May 15 00:56:42.338855 systemd[1]: Started systemd-ask-password-console.path. May 15 00:56:42.338867 systemd[1]: Started systemd-ask-password-wall.path. May 15 00:56:42.338876 systemd[1]: Set up automount boot.automount. May 15 00:56:42.338887 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 00:56:42.338897 systemd[1]: Stopped target initrd-switch-root.target. May 15 00:56:42.338907 systemd[1]: Stopped target initrd-fs.target. May 15 00:56:42.338917 systemd[1]: Stopped target initrd-root-fs.target. May 15 00:56:42.338928 systemd[1]: Reached target integritysetup.target. May 15 00:56:42.338938 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:56:42.338948 systemd[1]: Reached target remote-fs.target. May 15 00:56:42.338958 systemd[1]: Reached target slices.target. May 15 00:56:42.338967 systemd[1]: Reached target swap.target. May 15 00:56:42.338977 systemd[1]: Reached target torcx.target. May 15 00:56:42.338987 systemd[1]: Reached target veritysetup.target. May 15 00:56:42.338997 systemd[1]: Listening on systemd-coredump.socket. May 15 00:56:42.339007 systemd[1]: Listening on systemd-initctl.socket. May 15 00:56:42.339018 systemd[1]: Listening on systemd-networkd.socket. May 15 00:56:42.339028 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:56:42.339038 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:56:42.339047 systemd[1]: Listening on systemd-userdbd.socket. May 15 00:56:42.339057 systemd[1]: Mounting dev-hugepages.mount... May 15 00:56:42.339067 systemd[1]: Mounting dev-mqueue.mount... May 15 00:56:42.339077 systemd[1]: Mounting media.mount... May 15 00:56:42.339087 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:42.339097 systemd[1]: Mounting sys-kernel-debug.mount... May 15 00:56:42.339108 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 00:56:42.339117 systemd[1]: Mounting tmp.mount... May 15 00:56:42.339127 systemd[1]: Starting flatcar-tmpfiles.service... May 15 00:56:42.339137 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:56:42.339147 systemd[1]: Starting kmod-static-nodes.service... May 15 00:56:42.339157 systemd[1]: Starting modprobe@configfs.service... May 15 00:56:42.339167 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:56:42.339176 systemd[1]: Starting modprobe@drm.service... May 15 00:56:42.339186 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:56:42.339197 systemd[1]: Starting modprobe@fuse.service... May 15 00:56:42.339207 systemd[1]: Starting modprobe@loop.service... May 15 00:56:42.339218 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 00:56:42.339228 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 00:56:42.339237 systemd[1]: Stopped systemd-fsck-root.service. May 15 00:56:42.339247 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 00:56:42.339256 kernel: fuse: init (API version 7.34) May 15 00:56:42.339266 systemd[1]: Stopped systemd-fsck-usr.service. May 15 00:56:42.339275 systemd[1]: Stopped systemd-journald.service. May 15 00:56:42.339287 kernel: loop: module loaded May 15 00:56:42.339296 systemd[1]: Starting systemd-journald.service... May 15 00:56:42.339306 systemd[1]: Starting systemd-modules-load.service... May 15 00:56:42.339315 systemd[1]: Starting systemd-network-generator.service... May 15 00:56:42.339325 systemd[1]: Starting systemd-remount-fs.service... May 15 00:56:42.339335 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:56:42.339345 systemd[1]: verity-setup.service: Deactivated successfully. May 15 00:56:42.339355 systemd[1]: Stopped verity-setup.service. May 15 00:56:42.339365 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:42.339379 systemd-journald[988]: Journal started May 15 00:56:42.339414 systemd-journald[988]: Runtime Journal (/run/log/journal/d0ee3562eccd49ea909cfc5ad19783a7) is 6.0M, max 48.4M, 42.4M free. May 15 00:56:39.820000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 00:56:40.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:56:40.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:56:40.018000 audit: BPF prog-id=10 op=LOAD May 15 00:56:40.018000 audit: BPF prog-id=10 op=UNLOAD May 15 00:56:40.018000 audit: BPF prog-id=11 op=LOAD May 15 00:56:40.018000 audit: BPF prog-id=11 op=UNLOAD May 15 00:56:40.050000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:56:40.050000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.050000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:56:40.051000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:56:40.051000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155979 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.051000 audit: CWD cwd="/" May 15 00:56:40.051000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:40.051000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:40.051000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:56:42.163000 audit: BPF prog-id=12 op=LOAD May 15 00:56:42.163000 audit: BPF prog-id=3 op=UNLOAD May 15 00:56:42.175000 audit: BPF prog-id=13 op=LOAD May 15 00:56:42.176000 audit: BPF prog-id=14 op=LOAD May 15 00:56:42.176000 audit: BPF prog-id=4 op=UNLOAD May 15 00:56:42.176000 audit: BPF prog-id=5 op=UNLOAD May 15 00:56:42.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.205000 audit: BPF prog-id=12 op=UNLOAD May 15 00:56:42.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.318000 audit: BPF prog-id=15 op=LOAD May 15 00:56:42.318000 audit: BPF prog-id=16 op=LOAD May 15 00:56:42.318000 audit: BPF prog-id=17 op=LOAD May 15 00:56:42.318000 audit: BPF prog-id=13 op=UNLOAD May 15 00:56:42.318000 audit: BPF prog-id=14 op=UNLOAD May 15 00:56:42.336000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 00:56:42.336000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff06820180 a2=4000 a3=7fff0682021c items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.336000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 00:56:42.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.162092 systemd[1]: Queued start job for default target multi-user.target. May 15 00:56:40.049452 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:56:42.162103 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 00:56:40.049680 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:56:42.177767 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 00:56:40.049699 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:56:40.049729 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 00:56:40.049739 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 00:56:40.049765 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 00:56:40.049776 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 00:56:40.049944 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 00:56:40.049976 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:56:40.049987 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:56:40.050265 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 00:56:40.050295 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 00:56:40.050310 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 00:56:40.050323 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 00:56:40.050336 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 00:56:40.050347 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 00:56:41.906857 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:56:41.907086 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:56:41.907171 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:56:41.907311 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:56:41.907352 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 00:56:41.907399 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-15T00:56:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 00:56:42.342559 systemd[1]: Started systemd-journald.service. May 15 00:56:42.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.343120 systemd[1]: Mounted dev-hugepages.mount. May 15 00:56:42.344018 systemd[1]: Mounted dev-mqueue.mount. May 15 00:56:42.344882 systemd[1]: Mounted media.mount. May 15 00:56:42.345694 systemd[1]: Mounted sys-kernel-debug.mount. May 15 00:56:42.346615 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 00:56:42.347590 systemd[1]: Mounted tmp.mount. May 15 00:56:42.348603 systemd[1]: Finished flatcar-tmpfiles.service. May 15 00:56:42.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.349804 systemd[1]: Finished kmod-static-nodes.service. May 15 00:56:42.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.350890 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 00:56:42.351043 systemd[1]: Finished modprobe@configfs.service. May 15 00:56:42.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.352287 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:56:42.352490 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:56:42.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.353831 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:56:42.354021 systemd[1]: Finished modprobe@drm.service. May 15 00:56:42.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.355293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:56:42.355526 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:56:42.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.356894 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 00:56:42.357135 systemd[1]: Finished modprobe@fuse.service. May 15 00:56:42.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.358306 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:56:42.358488 systemd[1]: Finished modprobe@loop.service. May 15 00:56:42.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.359730 systemd[1]: Finished systemd-modules-load.service. May 15 00:56:42.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.361038 systemd[1]: Finished systemd-network-generator.service. May 15 00:56:42.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.362391 systemd[1]: Finished systemd-remount-fs.service. May 15 00:56:42.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.363917 systemd[1]: Reached target network-pre.target. May 15 00:56:42.366089 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 00:56:42.368495 systemd[1]: Mounting sys-kernel-config.mount... May 15 00:56:42.369355 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 00:56:42.370757 systemd[1]: Starting systemd-hwdb-update.service... May 15 00:56:42.372606 systemd[1]: Starting systemd-journal-flush.service... May 15 00:56:42.374127 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:56:42.375368 systemd[1]: Starting systemd-random-seed.service... May 15 00:56:42.375972 systemd-journald[988]: Time spent on flushing to /var/log/journal/d0ee3562eccd49ea909cfc5ad19783a7 is 25.017ms for 1141 entries. May 15 00:56:42.375972 systemd-journald[988]: System Journal (/var/log/journal/d0ee3562eccd49ea909cfc5ad19783a7) is 8.0M, max 195.6M, 187.6M free. May 15 00:56:42.414186 systemd-journald[988]: Received client request to flush runtime journal. May 15 00:56:42.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.377779 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:56:42.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.378762 systemd[1]: Starting systemd-sysctl.service... May 15 00:56:42.380689 systemd[1]: Starting systemd-sysusers.service... May 15 00:56:42.416688 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 00:56:42.383775 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:56:42.385074 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 00:56:42.386200 systemd[1]: Mounted sys-kernel-config.mount. May 15 00:56:42.387434 systemd[1]: Finished systemd-random-seed.service. May 15 00:56:42.388490 systemd[1]: Reached target first-boot-complete.target. May 15 00:56:42.390602 systemd[1]: Starting systemd-udev-settle.service... May 15 00:56:42.391652 systemd[1]: Finished systemd-sysctl.service. May 15 00:56:42.399860 systemd[1]: Finished systemd-sysusers.service. May 15 00:56:42.401731 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 00:56:42.415058 systemd[1]: Finished systemd-journal-flush.service. May 15 00:56:42.419300 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 00:56:42.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.780370 systemd[1]: Finished systemd-hwdb-update.service. May 15 00:56:42.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.781000 audit: BPF prog-id=18 op=LOAD May 15 00:56:42.781000 audit: BPF prog-id=19 op=LOAD May 15 00:56:42.781000 audit: BPF prog-id=7 op=UNLOAD May 15 00:56:42.781000 audit: BPF prog-id=8 op=UNLOAD May 15 00:56:42.782460 systemd[1]: Starting systemd-udevd.service... May 15 00:56:42.797356 systemd-udevd[1011]: Using default interface naming scheme 'v252'. May 15 00:56:42.809877 systemd[1]: Started systemd-udevd.service. May 15 00:56:42.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.811000 audit: BPF prog-id=20 op=LOAD May 15 00:56:42.813044 systemd[1]: Starting systemd-networkd.service... May 15 00:56:42.818000 audit: BPF prog-id=21 op=LOAD May 15 00:56:42.818000 audit: BPF prog-id=22 op=LOAD May 15 00:56:42.818000 audit: BPF prog-id=23 op=LOAD May 15 00:56:42.820153 systemd[1]: Starting systemd-userdbd.service... May 15 00:56:42.836289 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 00:56:42.845467 systemd[1]: Started systemd-userdbd.service. May 15 00:56:42.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.864358 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:56:42.888591 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 00:56:42.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:42.894135 systemd-networkd[1017]: lo: Link UP May 15 00:56:42.894141 systemd-networkd[1017]: lo: Gained carrier May 15 00:56:42.894474 systemd-networkd[1017]: Enumeration completed May 15 00:56:42.894553 systemd[1]: Started systemd-networkd.service. May 15 00:56:42.896004 systemd-networkd[1017]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:56:42.896903 systemd-networkd[1017]: eth0: Link UP May 15 00:56:42.896908 systemd-networkd[1017]: eth0: Gained carrier May 15 00:56:42.897576 kernel: ACPI: button: Power Button [PWRF] May 15 00:56:42.907659 systemd-networkd[1017]: eth0: DHCPv4 address 10.0.0.130/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:56:42.895000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 00:56:42.895000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5605e48dff20 a1=338ac a2=7f0b04349bc5 a3=5 items=110 ppid=1011 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.895000 audit: CWD cwd="/" May 15 00:56:42.895000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=1 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=2 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=3 name=(null) inode=14014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=4 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=5 name=(null) inode=14015 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=6 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=7 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=8 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=9 name=(null) inode=14017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=10 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=11 name=(null) inode=14018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=12 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=13 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=14 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=15 name=(null) inode=14020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=16 name=(null) inode=14016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=17 name=(null) inode=14021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=18 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=19 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=20 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=21 name=(null) inode=14023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=22 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=23 name=(null) inode=14024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=24 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=25 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=26 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=27 name=(null) inode=14026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=28 name=(null) inode=14022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=29 name=(null) inode=14027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=30 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=31 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=32 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=33 name=(null) inode=14029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=34 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=35 name=(null) inode=14030 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=36 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=37 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=38 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=39 name=(null) inode=14032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=40 name=(null) inode=14028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=41 name=(null) inode=14033 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=42 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=43 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=44 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=45 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=46 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=47 name=(null) inode=14036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=48 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=49 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=50 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=51 name=(null) inode=14038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=52 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=53 name=(null) inode=14039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=55 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=56 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=57 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=58 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=59 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=60 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=61 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=62 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=63 name=(null) inode=14044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=64 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=65 name=(null) inode=14045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=66 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=67 name=(null) inode=14046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=68 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=69 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=70 name=(null) inode=14043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=71 name=(null) inode=14048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=72 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=73 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=74 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=75 name=(null) inode=14050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=76 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=77 name=(null) inode=14051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=78 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=79 name=(null) inode=14052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=80 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=81 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=82 name=(null) inode=14049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=83 name=(null) inode=14054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=84 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=85 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=86 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=87 name=(null) inode=14056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=88 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=89 name=(null) inode=14057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=90 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=91 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=92 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=93 name=(null) inode=14059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=94 name=(null) inode=14055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=95 name=(null) inode=14060 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=96 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=97 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=98 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=99 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=100 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=101 name=(null) inode=14063 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=102 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=103 name=(null) inode=14064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=104 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=105 name=(null) inode=14065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=106 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=107 name=(null) inode=14066 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PATH item=109 name=(null) inode=14067 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:56:42.895000 audit: PROCTITLE proctitle="(udev-worker)" May 15 00:56:42.925190 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 00:56:42.929987 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 00:56:42.930223 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 00:56:42.930700 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 00:56:42.932561 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 00:56:42.937568 kernel: mousedev: PS/2 mouse device common for all mice May 15 00:56:42.973847 kernel: kvm: Nested Virtualization enabled May 15 00:56:42.973940 kernel: SVM: kvm: Nested Paging enabled May 15 00:56:42.973955 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 00:56:42.973969 kernel: SVM: Virtual GIF supported May 15 00:56:42.987569 kernel: EDAC MC: Ver: 3.0.0 May 15 00:56:43.009857 systemd[1]: Finished systemd-udev-settle.service. May 15 00:56:43.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.011897 systemd[1]: Starting lvm2-activation-early.service... May 15 00:56:43.019248 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:56:43.042215 systemd[1]: Finished lvm2-activation-early.service. May 15 00:56:43.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.043316 systemd[1]: Reached target cryptsetup.target. May 15 00:56:43.045139 systemd[1]: Starting lvm2-activation.service... May 15 00:56:43.048943 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:56:43.074585 systemd[1]: Finished lvm2-activation.service. May 15 00:56:43.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.075634 systemd[1]: Reached target local-fs-pre.target. May 15 00:56:43.076509 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 00:56:43.076550 systemd[1]: Reached target local-fs.target. May 15 00:56:43.077357 systemd[1]: Reached target machines.target. May 15 00:56:43.079456 systemd[1]: Starting ldconfig.service... May 15 00:56:43.080460 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:56:43.080501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:43.081349 systemd[1]: Starting systemd-boot-update.service... May 15 00:56:43.083185 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 00:56:43.085158 systemd[1]: Starting systemd-machine-id-commit.service... May 15 00:56:43.087778 systemd[1]: Starting systemd-sysext.service... May 15 00:56:43.089301 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) May 15 00:56:43.090606 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 00:56:43.096059 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 00:56:43.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.101153 systemd[1]: Unmounting usr-share-oem.mount... May 15 00:56:43.105736 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 00:56:43.105937 systemd[1]: Unmounted usr-share-oem.mount. May 15 00:56:43.115566 kernel: loop0: detected capacity change from 0 to 218376 May 15 00:56:43.144080 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) May 15 00:56:43.144080 systemd-fsck[1058]: /dev/vda1: 791 files, 120710/258078 clusters May 15 00:56:43.146026 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 00:56:43.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.148286 systemd[1]: Mounting boot.mount... May 15 00:56:43.294913 systemd[1]: Mounted boot.mount. May 15 00:56:43.302548 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 00:56:43.303185 systemd[1]: Finished systemd-machine-id-commit.service. May 15 00:56:43.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.307630 systemd[1]: Finished systemd-boot-update.service. May 15 00:56:43.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.321564 kernel: loop1: detected capacity change from 0 to 218376 May 15 00:56:43.326047 (sd-sysext)[1063]: Using extensions 'kubernetes'. May 15 00:56:43.326358 (sd-sysext)[1063]: Merged extensions into '/usr'. May 15 00:56:43.341067 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 00:56:43.341561 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.342807 systemd[1]: Mounting usr-share-oem.mount... May 15 00:56:43.343858 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:56:43.345050 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:56:43.346859 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:56:43.348650 systemd[1]: Starting modprobe@loop.service... May 15 00:56:43.349807 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:56:43.349948 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:43.350080 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.352902 systemd[1]: Mounted usr-share-oem.mount. May 15 00:56:43.354411 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:56:43.354592 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:56:43.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.356298 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:56:43.356547 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:56:43.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.358428 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:56:43.358566 systemd[1]: Finished modprobe@loop.service. May 15 00:56:43.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.360292 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:56:43.360409 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:56:43.361401 systemd[1]: Finished systemd-sysext.service. May 15 00:56:43.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.363963 systemd[1]: Starting ensure-sysext.service... May 15 00:56:43.366014 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 00:56:43.371367 systemd[1]: Reloading. May 15 00:56:43.374590 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 00:56:43.376387 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 00:56:43.382683 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 00:56:43.384084 systemd-tmpfiles[1070]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 00:56:43.420681 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2025-05-15T00:56:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:56:43.420983 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2025-05-15T00:56:43Z" level=info msg="torcx already run" May 15 00:56:43.483181 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:56:43.483195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:56:43.499904 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:56:43.547000 audit: BPF prog-id=24 op=LOAD May 15 00:56:43.548000 audit: BPF prog-id=15 op=UNLOAD May 15 00:56:43.548000 audit: BPF prog-id=25 op=LOAD May 15 00:56:43.548000 audit: BPF prog-id=26 op=LOAD May 15 00:56:43.548000 audit: BPF prog-id=16 op=UNLOAD May 15 00:56:43.548000 audit: BPF prog-id=17 op=UNLOAD May 15 00:56:43.549000 audit: BPF prog-id=27 op=LOAD May 15 00:56:43.549000 audit: BPF prog-id=20 op=UNLOAD May 15 00:56:43.550000 audit: BPF prog-id=28 op=LOAD May 15 00:56:43.550000 audit: BPF prog-id=29 op=LOAD May 15 00:56:43.550000 audit: BPF prog-id=18 op=UNLOAD May 15 00:56:43.550000 audit: BPF prog-id=19 op=UNLOAD May 15 00:56:43.550000 audit: BPF prog-id=30 op=LOAD May 15 00:56:43.550000 audit: BPF prog-id=21 op=UNLOAD May 15 00:56:43.551000 audit: BPF prog-id=31 op=LOAD May 15 00:56:43.551000 audit: BPF prog-id=32 op=LOAD May 15 00:56:43.551000 audit: BPF prog-id=22 op=UNLOAD May 15 00:56:43.551000 audit: BPF prog-id=23 op=UNLOAD May 15 00:56:43.554257 systemd[1]: Finished ldconfig.service. May 15 00:56:43.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.555950 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 00:56:43.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.559365 systemd[1]: Starting audit-rules.service... May 15 00:56:43.560869 systemd[1]: Starting clean-ca-certificates.service... May 15 00:56:43.562810 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 00:56:43.563000 audit: BPF prog-id=33 op=LOAD May 15 00:56:43.564947 systemd[1]: Starting systemd-resolved.service... May 15 00:56:43.567000 audit: BPF prog-id=34 op=LOAD May 15 00:56:43.568764 systemd[1]: Starting systemd-timesyncd.service... May 15 00:56:43.570316 systemd[1]: Starting systemd-update-utmp.service... May 15 00:56:43.571525 systemd[1]: Finished clean-ca-certificates.service. May 15 00:56:43.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.574297 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:56:43.575000 audit[1145]: SYSTEM_BOOT pid=1145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 00:56:43.576929 systemd[1]: Finished systemd-update-utmp.service. May 15 00:56:43.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.579232 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.579401 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:56:43.580522 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:56:43.582135 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:56:43.583839 systemd[1]: Starting modprobe@loop.service... May 15 00:56:43.584684 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:56:43.584814 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:43.584915 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:56:43.584982 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.585919 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 00:56:43.587319 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:56:43.587432 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:56:43.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:43.587000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 00:56:43.587000 audit[1155]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0250d270 a2=420 a3=0 items=0 ppid=1132 pid=1155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:43.587000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 00:56:43.587877 augenrules[1155]: No rules May 15 00:56:43.588616 systemd[1]: Finished audit-rules.service. May 15 00:56:43.589659 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:56:43.589765 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:56:43.590973 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:56:43.591072 systemd[1]: Finished modprobe@loop.service. May 15 00:56:43.592200 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:56:43.592289 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:56:43.593564 systemd[1]: Starting systemd-update-done.service... May 15 00:56:43.596237 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.596455 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:56:43.597676 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:56:43.600309 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:56:43.602212 systemd[1]: Starting modprobe@loop.service... May 15 00:56:43.602987 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:56:43.603097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:43.603184 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:56:43.603248 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.604079 systemd[1]: Finished systemd-update-done.service. May 15 00:56:43.605299 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:56:43.605408 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:56:43.606596 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:56:43.606697 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:56:43.607891 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:56:43.607978 systemd[1]: Finished modprobe@loop.service. May 15 00:56:43.609240 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:56:43.609323 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:56:43.611265 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.611452 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:56:43.612766 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:56:43.614373 systemd[1]: Starting modprobe@drm.service... May 15 00:56:43.615931 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:56:43.617519 systemd[1]: Starting modprobe@loop.service... May 15 00:56:43.618339 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:56:43.618429 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:43.619278 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 00:56:43.620411 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:56:43.620495 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:56:43.621372 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:56:43.621466 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:56:43.622746 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:56:43.622838 systemd[1]: Finished modprobe@drm.service. May 15 00:56:43.624110 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:56:43.624218 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:56:43.625593 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:56:43.625713 systemd[1]: Finished modprobe@loop.service. May 15 00:56:43.626978 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:56:43.627100 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:56:43.629002 systemd[1]: Finished ensure-sysext.service. May 15 00:56:43.637855 systemd[1]: Started systemd-timesyncd.service. May 15 00:56:43.638993 systemd[1]: Reached target time-set.target. May 15 00:56:43.639101 systemd-resolved[1136]: Positive Trust Anchors: May 15 00:56:43.639109 systemd-resolved[1136]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:56:43.639160 systemd-resolved[1136]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:56:44.790508 systemd-timesyncd[1143]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 00:56:44.790547 systemd-timesyncd[1143]: Initial clock synchronization to Thu 2025-05-15 00:56:44.790433 UTC. May 15 00:56:44.797048 systemd-resolved[1136]: Defaulting to hostname 'linux'. May 15 00:56:44.798257 systemd[1]: Started systemd-resolved.service. May 15 00:56:44.799202 systemd[1]: Reached target network.target. May 15 00:56:44.800039 systemd[1]: Reached target nss-lookup.target. May 15 00:56:44.800911 systemd[1]: Reached target sysinit.target. May 15 00:56:44.801799 systemd[1]: Started motdgen.path. May 15 00:56:44.802550 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 00:56:44.803826 systemd[1]: Started logrotate.timer. May 15 00:56:44.804651 systemd[1]: Started mdadm.timer. May 15 00:56:44.805400 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 00:56:44.806319 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 00:56:44.806342 systemd[1]: Reached target paths.target. May 15 00:56:44.807153 systemd[1]: Reached target timers.target. May 15 00:56:44.808229 systemd[1]: Listening on dbus.socket. May 15 00:56:44.809872 systemd[1]: Starting docker.socket... May 15 00:56:44.812454 systemd[1]: Listening on sshd.socket. May 15 00:56:44.813353 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:44.813663 systemd[1]: Listening on docker.socket. May 15 00:56:44.814537 systemd[1]: Reached target sockets.target. May 15 00:56:44.815372 systemd[1]: Reached target basic.target. May 15 00:56:44.816230 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:56:44.816253 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:56:44.816989 systemd[1]: Starting containerd.service... May 15 00:56:44.818528 systemd[1]: Starting dbus.service... May 15 00:56:44.820012 systemd[1]: Starting enable-oem-cloudinit.service... May 15 00:56:44.821727 systemd[1]: Starting extend-filesystems.service... May 15 00:56:44.822729 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 00:56:44.823874 jq[1174]: false May 15 00:56:44.823576 systemd[1]: Starting motdgen.service... May 15 00:56:44.825072 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 00:56:44.827245 systemd[1]: Starting sshd-keygen.service... May 15 00:56:44.830022 systemd[1]: Starting systemd-logind.service... May 15 00:56:44.830826 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:56:44.830878 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 00:56:44.831202 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 00:56:44.831752 systemd[1]: Starting update-engine.service... May 15 00:56:44.834224 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 00:56:44.837854 jq[1190]: true May 15 00:56:44.840306 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 00:56:44.840444 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 00:56:44.840732 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 00:56:44.840878 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 00:56:44.842724 systemd[1]: motdgen.service: Deactivated successfully. May 15 00:56:44.842877 systemd[1]: Finished motdgen.service. May 15 00:56:44.845366 dbus-daemon[1173]: [system] SELinux support is enabled May 15 00:56:44.845480 systemd[1]: Started dbus.service. May 15 00:56:44.847949 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 00:56:44.847975 systemd[1]: Reached target system-config.target. May 15 00:56:44.848909 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 00:56:44.848928 systemd[1]: Reached target user-config.target. May 15 00:56:44.850485 extend-filesystems[1175]: Found loop1 May 15 00:56:44.850485 extend-filesystems[1175]: Found sr0 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda May 15 00:56:44.850485 extend-filesystems[1175]: Found vda1 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda2 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda3 May 15 00:56:44.850485 extend-filesystems[1175]: Found usr May 15 00:56:44.850485 extend-filesystems[1175]: Found vda4 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda6 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda7 May 15 00:56:44.850485 extend-filesystems[1175]: Found vda9 May 15 00:56:44.850485 extend-filesystems[1175]: Checking size of /dev/vda9 May 15 00:56:44.860589 update_engine[1186]: I0515 00:56:44.859520 1186 main.cc:92] Flatcar Update Engine starting May 15 00:56:44.861900 jq[1194]: true May 15 00:56:44.863573 update_engine[1186]: I0515 00:56:44.863533 1186 update_check_scheduler.cc:74] Next update check in 7m11s May 15 00:56:44.863702 systemd[1]: Started update-engine.service. May 15 00:56:44.865916 systemd[1]: Started locksmithd.service. May 15 00:56:44.880296 env[1195]: time="2025-05-15T00:56:44.880218618Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 00:56:44.885693 systemd-logind[1183]: Watching system buttons on /dev/input/event1 (Power Button) May 15 00:56:44.885717 systemd-logind[1183]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 00:56:44.886205 systemd-logind[1183]: New seat seat0. May 15 00:56:44.889326 systemd[1]: Started systemd-logind.service. May 15 00:56:44.893589 extend-filesystems[1175]: Resized partition /dev/vda9 May 15 00:56:44.905521 env[1195]: time="2025-05-15T00:56:44.905481733Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 00:56:44.905675 env[1195]: time="2025-05-15T00:56:44.905651160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.907627 env[1195]: time="2025-05-15T00:56:44.907596160Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 00:56:44.907627 env[1195]: time="2025-05-15T00:56:44.907623752Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.907892 env[1195]: time="2025-05-15T00:56:44.907865556Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:56:44.907892 env[1195]: time="2025-05-15T00:56:44.907889130Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.907955 env[1195]: time="2025-05-15T00:56:44.907902635Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 00:56:44.907955 env[1195]: time="2025-05-15T00:56:44.907911422Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.907992 env[1195]: time="2025-05-15T00:56:44.907972336Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.908188 env[1195]: time="2025-05-15T00:56:44.908164066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 00:56:44.908301 env[1195]: time="2025-05-15T00:56:44.908275976Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:56:44.908301 env[1195]: time="2025-05-15T00:56:44.908294681Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 00:56:44.908360 env[1195]: time="2025-05-15T00:56:44.908331861Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 00:56:44.908360 env[1195]: time="2025-05-15T00:56:44.908342210Z" level=info msg="metadata content store policy set" policy=shared May 15 00:56:44.930007 extend-filesystems[1228]: resize2fs 1.46.5 (30-Dec-2021) May 15 00:56:44.946486 locksmithd[1205]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 00:56:45.007812 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 00:56:45.118833 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 00:56:45.181875 extend-filesystems[1228]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 00:56:45.181875 extend-filesystems[1228]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 00:56:45.181875 extend-filesystems[1228]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 00:56:45.188078 extend-filesystems[1175]: Resized filesystem in /dev/vda9 May 15 00:56:45.182731 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 00:56:45.182972 systemd[1]: Finished extend-filesystems.service. May 15 00:56:45.203741 bash[1219]: Updated "/home/core/.ssh/authorized_keys" May 15 00:56:45.204493 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 00:56:45.205653 env[1195]: time="2025-05-15T00:56:45.205611535Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 00:56:45.205715 env[1195]: time="2025-05-15T00:56:45.205656058Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 00:56:45.205715 env[1195]: time="2025-05-15T00:56:45.205667930Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 00:56:45.205715 env[1195]: time="2025-05-15T00:56:45.205699470Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205715 env[1195]: time="2025-05-15T00:56:45.205712534Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205812 env[1195]: time="2025-05-15T00:56:45.205725508Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205812 env[1195]: time="2025-05-15T00:56:45.205737451Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205812 env[1195]: time="2025-05-15T00:56:45.205750125Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205812 env[1195]: time="2025-05-15T00:56:45.205770473Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205899 env[1195]: time="2025-05-15T00:56:45.205811460Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205899 env[1195]: time="2025-05-15T00:56:45.205826799Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 00:56:45.205899 env[1195]: time="2025-05-15T00:56:45.205840895Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 00:56:45.205974 env[1195]: time="2025-05-15T00:56:45.205954678Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 00:56:45.206067 env[1195]: time="2025-05-15T00:56:45.206022396Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 00:56:45.206256 env[1195]: time="2025-05-15T00:56:45.206242278Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 00:56:45.206311 env[1195]: time="2025-05-15T00:56:45.206266494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206311 env[1195]: time="2025-05-15T00:56:45.206277304Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 00:56:45.206356 env[1195]: time="2025-05-15T00:56:45.206315766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206356 env[1195]: time="2025-05-15T00:56:45.206326516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206356 env[1195]: time="2025-05-15T00:56:45.206337296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206356 env[1195]: time="2025-05-15T00:56:45.206346874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206425 env[1195]: time="2025-05-15T00:56:45.206358095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206425 env[1195]: time="2025-05-15T00:56:45.206369016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206425 env[1195]: time="2025-05-15T00:56:45.206379095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206425 env[1195]: time="2025-05-15T00:56:45.206388623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206425 env[1195]: time="2025-05-15T00:56:45.206400585Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 00:56:45.206542 env[1195]: time="2025-05-15T00:56:45.206491736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206542 env[1195]: time="2025-05-15T00:56:45.206504460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206542 env[1195]: time="2025-05-15T00:56:45.206514499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206542 env[1195]: time="2025-05-15T00:56:45.206524919Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 00:56:45.206619 env[1195]: time="2025-05-15T00:56:45.206537733Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 00:56:45.206619 env[1195]: time="2025-05-15T00:56:45.206548132Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 00:56:45.206619 env[1195]: time="2025-05-15T00:56:45.206567679Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 00:56:45.206619 env[1195]: time="2025-05-15T00:56:45.206600190Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 00:56:45.206823 env[1195]: time="2025-05-15T00:56:45.206774577Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 00:56:45.207450 env[1195]: time="2025-05-15T00:56:45.206832926Z" level=info msg="Connect containerd service" May 15 00:56:45.207450 env[1195]: time="2025-05-15T00:56:45.206861731Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 00:56:45.207450 env[1195]: time="2025-05-15T00:56:45.207412534Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:56:45.207578 env[1195]: time="2025-05-15T00:56:45.207517972Z" level=info msg="Start subscribing containerd event" May 15 00:56:45.207578 env[1195]: time="2025-05-15T00:56:45.207555863Z" level=info msg="Start recovering state" May 15 00:56:45.207620 env[1195]: time="2025-05-15T00:56:45.207610135Z" level=info msg="Start event monitor" May 15 00:56:45.207643 env[1195]: time="2025-05-15T00:56:45.207626105Z" level=info msg="Start snapshots syncer" May 15 00:56:45.207643 env[1195]: time="2025-05-15T00:56:45.207634320Z" level=info msg="Start cni network conf syncer for default" May 15 00:56:45.207643 env[1195]: time="2025-05-15T00:56:45.207634380Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 00:56:45.207702 env[1195]: time="2025-05-15T00:56:45.207641023Z" level=info msg="Start streaming server" May 15 00:56:45.207739 env[1195]: time="2025-05-15T00:56:45.207723267Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 00:56:45.207825 env[1195]: time="2025-05-15T00:56:45.207792988Z" level=info msg="containerd successfully booted in 0.334257s" May 15 00:56:45.207861 systemd[1]: Started containerd.service. May 15 00:56:45.244979 systemd-networkd[1017]: eth0: Gained IPv6LL May 15 00:56:45.246602 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 00:56:45.247974 systemd[1]: Reached target network-online.target. May 15 00:56:45.250355 systemd[1]: Starting kubelet.service... May 15 00:56:45.740075 sshd_keygen[1193]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 00:56:45.756926 systemd[1]: Finished sshd-keygen.service. May 15 00:56:45.759184 systemd[1]: Starting issuegen.service... May 15 00:56:45.763942 systemd[1]: issuegen.service: Deactivated successfully. May 15 00:56:45.764061 systemd[1]: Finished issuegen.service. May 15 00:56:45.765854 systemd[1]: Starting systemd-user-sessions.service... May 15 00:56:45.771608 systemd[1]: Finished systemd-user-sessions.service. May 15 00:56:45.773633 systemd[1]: Started getty@tty1.service. May 15 00:56:45.775438 systemd[1]: Started serial-getty@ttyS0.service. May 15 00:56:45.776511 systemd[1]: Reached target getty.target. May 15 00:56:45.868911 systemd[1]: Started kubelet.service. May 15 00:56:45.870183 systemd[1]: Reached target multi-user.target. May 15 00:56:45.872100 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 00:56:45.877888 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 00:56:45.878014 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 00:56:45.879161 systemd[1]: Startup finished in 689ms (kernel) + 4.087s (initrd) + 4.946s (userspace) = 9.723s. May 15 00:56:46.259982 kubelet[1250]: E0515 00:56:46.259932 1250 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:56:46.261651 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:56:46.261833 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:56:49.101644 systemd[1]: Created slice system-sshd.slice. May 15 00:56:49.102573 systemd[1]: Started sshd@0-10.0.0.130:22-10.0.0.1:53128.service. May 15 00:56:49.141730 sshd[1259]: Accepted publickey for core from 10.0.0.1 port 53128 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.143179 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.150873 systemd-logind[1183]: New session 1 of user core. May 15 00:56:49.151680 systemd[1]: Created slice user-500.slice. May 15 00:56:49.152578 systemd[1]: Starting user-runtime-dir@500.service... May 15 00:56:49.159664 systemd[1]: Finished user-runtime-dir@500.service. May 15 00:56:49.160773 systemd[1]: Starting user@500.service... May 15 00:56:49.162977 (systemd)[1262]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.226160 systemd[1262]: Queued start job for default target default.target. May 15 00:56:49.226535 systemd[1262]: Reached target paths.target. May 15 00:56:49.226551 systemd[1262]: Reached target sockets.target. May 15 00:56:49.226562 systemd[1262]: Reached target timers.target. May 15 00:56:49.226571 systemd[1262]: Reached target basic.target. May 15 00:56:49.226602 systemd[1262]: Reached target default.target. May 15 00:56:49.226622 systemd[1262]: Startup finished in 59ms. May 15 00:56:49.226668 systemd[1]: Started user@500.service. May 15 00:56:49.227471 systemd[1]: Started session-1.scope. May 15 00:56:49.276928 systemd[1]: Started sshd@1-10.0.0.130:22-10.0.0.1:53144.service. May 15 00:56:49.313519 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 53144 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.314635 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.317904 systemd-logind[1183]: New session 2 of user core. May 15 00:56:49.318850 systemd[1]: Started session-2.scope. May 15 00:56:49.371426 sshd[1271]: pam_unix(sshd:session): session closed for user core May 15 00:56:49.373939 systemd[1]: sshd@1-10.0.0.130:22-10.0.0.1:53144.service: Deactivated successfully. May 15 00:56:49.374459 systemd[1]: session-2.scope: Deactivated successfully. May 15 00:56:49.374926 systemd-logind[1183]: Session 2 logged out. Waiting for processes to exit. May 15 00:56:49.375740 systemd[1]: Started sshd@2-10.0.0.130:22-10.0.0.1:53156.service. May 15 00:56:49.376324 systemd-logind[1183]: Removed session 2. May 15 00:56:49.410496 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 53156 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.411461 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.414488 systemd-logind[1183]: New session 3 of user core. May 15 00:56:49.415218 systemd[1]: Started session-3.scope. May 15 00:56:49.465016 sshd[1277]: pam_unix(sshd:session): session closed for user core May 15 00:56:49.467359 systemd[1]: sshd@2-10.0.0.130:22-10.0.0.1:53156.service: Deactivated successfully. May 15 00:56:49.467860 systemd[1]: session-3.scope: Deactivated successfully. May 15 00:56:49.468292 systemd-logind[1183]: Session 3 logged out. Waiting for processes to exit. May 15 00:56:49.469146 systemd[1]: Started sshd@3-10.0.0.130:22-10.0.0.1:53162.service. May 15 00:56:49.469906 systemd-logind[1183]: Removed session 3. May 15 00:56:49.503881 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 53162 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.504818 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.508013 systemd-logind[1183]: New session 4 of user core. May 15 00:56:49.508621 systemd[1]: Started session-4.scope. May 15 00:56:49.562359 sshd[1283]: pam_unix(sshd:session): session closed for user core May 15 00:56:49.565028 systemd[1]: Started sshd@4-10.0.0.130:22-10.0.0.1:53166.service. May 15 00:56:49.565437 systemd[1]: sshd@3-10.0.0.130:22-10.0.0.1:53162.service: Deactivated successfully. May 15 00:56:49.565916 systemd[1]: session-4.scope: Deactivated successfully. May 15 00:56:49.566406 systemd-logind[1183]: Session 4 logged out. Waiting for processes to exit. May 15 00:56:49.567284 systemd-logind[1183]: Removed session 4. May 15 00:56:49.600284 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 53166 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.601296 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.604314 systemd-logind[1183]: New session 5 of user core. May 15 00:56:49.605003 systemd[1]: Started session-5.scope. May 15 00:56:49.657608 sudo[1293]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 00:56:49.657804 sudo[1293]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:49.664036 dbus-daemon[1173]: \xd0\u000d^/PV: received setenforce notice (enforcing=-325701728) May 15 00:56:49.666263 sudo[1293]: pam_unix(sudo:session): session closed for user root May 15 00:56:49.667728 sshd[1289]: pam_unix(sshd:session): session closed for user core May 15 00:56:49.670393 systemd[1]: sshd@4-10.0.0.130:22-10.0.0.1:53166.service: Deactivated successfully. May 15 00:56:49.670892 systemd[1]: session-5.scope: Deactivated successfully. May 15 00:56:49.671363 systemd-logind[1183]: Session 5 logged out. Waiting for processes to exit. May 15 00:56:49.672371 systemd[1]: Started sshd@5-10.0.0.130:22-10.0.0.1:53174.service. May 15 00:56:49.673029 systemd-logind[1183]: Removed session 5. May 15 00:56:49.706811 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 53174 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.707657 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.710813 systemd-logind[1183]: New session 6 of user core. May 15 00:56:49.711504 systemd[1]: Started session-6.scope. May 15 00:56:49.762083 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 00:56:49.762263 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:49.765061 sudo[1301]: pam_unix(sudo:session): session closed for user root May 15 00:56:49.769501 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 00:56:49.769710 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:49.778037 systemd[1]: Stopping audit-rules.service... May 15 00:56:49.778000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:56:49.779302 auditctl[1304]: No rules May 15 00:56:49.779611 systemd[1]: audit-rules.service: Deactivated successfully. May 15 00:56:49.779800 systemd[1]: Stopped audit-rules.service. May 15 00:56:49.779977 kernel: kauditd_printk_skb: 206 callbacks suppressed May 15 00:56:49.780018 kernel: audit: type=1305 audit(1747270609.778:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:56:49.781103 systemd[1]: Starting audit-rules.service... May 15 00:56:49.778000 audit[1304]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2fc8b450 a2=420 a3=0 items=0 ppid=1 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:49.787646 kernel: audit: type=1300 audit(1747270609.778:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2fc8b450 a2=420 a3=0 items=0 ppid=1 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:49.787702 kernel: audit: type=1327 audit(1747270609.778:186): proctitle=2F7362696E2F617564697463746C002D44 May 15 00:56:49.787728 kernel: audit: type=1131 audit(1747270609.779:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.778000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 00:56:49.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.796972 augenrules[1321]: No rules May 15 00:56:49.797627 systemd[1]: Finished audit-rules.service. May 15 00:56:49.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.798491 sudo[1300]: pam_unix(sudo:session): session closed for user root May 15 00:56:49.797000 audit[1300]: USER_END pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.801829 sshd[1297]: pam_unix(sshd:session): session closed for user core May 15 00:56:49.804192 systemd[1]: sshd@5-10.0.0.130:22-10.0.0.1:53174.service: Deactivated successfully. May 15 00:56:49.804921 systemd[1]: session-6.scope: Deactivated successfully. May 15 00:56:49.805439 systemd-logind[1183]: Session 6 logged out. Waiting for processes to exit. May 15 00:56:49.805621 kernel: audit: type=1130 audit(1747270609.797:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.805659 kernel: audit: type=1106 audit(1747270609.797:189): pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.805690 kernel: audit: type=1104 audit(1747270609.797:190): pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.797000 audit[1300]: CRED_DISP pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.809174 kernel: audit: type=1106 audit(1747270609.801:191): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.801000 audit[1297]: USER_END pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.809272 systemd[1]: Started sshd@6-10.0.0.130:22-10.0.0.1:53186.service. May 15 00:56:49.810045 systemd-logind[1183]: Removed session 6. May 15 00:56:49.802000 audit[1297]: CRED_DISP pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.818571 kernel: audit: type=1104 audit(1747270609.802:192): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.818645 kernel: audit: type=1131 audit(1747270609.803:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.130:22-10.0.0.1:53174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.130:22-10.0.0.1:53174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.130:22-10.0.0.1:53186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.851000 audit[1327]: USER_ACCT pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.852396 sshd[1327]: Accepted publickey for core from 10.0.0.1 port 53186 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:49.852000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.852000 audit[1327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb31e56c0 a2=3 a3=0 items=0 ppid=1 pid=1327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:49.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:56:49.853327 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:49.856554 systemd-logind[1183]: New session 7 of user core. May 15 00:56:49.857330 systemd[1]: Started session-7.scope. May 15 00:56:49.860000 audit[1327]: USER_START pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.861000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:49.907000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.907000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.908604 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 00:56:49.908836 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:49.910000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:49.920632 systemd[1]: Starting coreos-metadata.service... May 15 00:56:49.927399 systemd[1]: coreos-metadata.service: Deactivated successfully. May 15 00:56:49.927557 systemd[1]: Finished coreos-metadata.service. May 15 00:56:49.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:49.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.343931 systemd[1]: Stopped kubelet.service. May 15 00:56:50.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.346389 systemd[1]: Starting kubelet.service... May 15 00:56:50.371953 systemd[1]: Reloading. May 15 00:56:50.436290 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-05-15T00:56:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:56:50.436323 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-05-15T00:56:50Z" level=info msg="torcx already run" May 15 00:56:50.719074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:56:50.719091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:56:50.736276 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit: BPF prog-id=40 op=LOAD May 15 00:56:50.792000 audit: BPF prog-id=24 op=UNLOAD May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit: BPF prog-id=41 op=LOAD May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit: BPF prog-id=42 op=LOAD May 15 00:56:50.793000 audit: BPF prog-id=25 op=UNLOAD May 15 00:56:50.793000 audit: BPF prog-id=26 op=UNLOAD May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.793000 audit: BPF prog-id=43 op=LOAD May 15 00:56:50.793000 audit: BPF prog-id=34 op=UNLOAD May 15 00:56:50.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit: BPF prog-id=44 op=LOAD May 15 00:56:50.795000 audit: BPF prog-id=38 op=UNLOAD May 15 00:56:50.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit: BPF prog-id=45 op=LOAD May 15 00:56:50.796000 audit: BPF prog-id=27 op=UNLOAD May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.796000 audit: BPF prog-id=46 op=LOAD May 15 00:56:50.796000 audit: BPF prog-id=33 op=UNLOAD May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit: BPF prog-id=47 op=LOAD May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.797000 audit: BPF prog-id=48 op=LOAD May 15 00:56:50.797000 audit: BPF prog-id=28 op=UNLOAD May 15 00:56:50.797000 audit: BPF prog-id=29 op=UNLOAD May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit: BPF prog-id=49 op=LOAD May 15 00:56:50.798000 audit: BPF prog-id=30 op=UNLOAD May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit: BPF prog-id=50 op=LOAD May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.798000 audit: BPF prog-id=51 op=LOAD May 15 00:56:50.798000 audit: BPF prog-id=31 op=UNLOAD May 15 00:56:50.798000 audit: BPF prog-id=32 op=UNLOAD May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit: BPF prog-id=52 op=LOAD May 15 00:56:50.800000 audit: BPF prog-id=35 op=UNLOAD May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit: BPF prog-id=53 op=LOAD May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:50.800000 audit: BPF prog-id=54 op=LOAD May 15 00:56:50.800000 audit: BPF prog-id=36 op=UNLOAD May 15 00:56:50.800000 audit: BPF prog-id=37 op=UNLOAD May 15 00:56:50.810859 systemd[1]: Started kubelet.service. May 15 00:56:50.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.812163 systemd[1]: Stopping kubelet.service... May 15 00:56:50.812405 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:56:50.812570 systemd[1]: Stopped kubelet.service. May 15 00:56:50.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.813984 systemd[1]: Starting kubelet.service... May 15 00:56:50.891472 systemd[1]: Started kubelet.service. May 15 00:56:50.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:50.926426 kubelet[1438]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:50.926426 kubelet[1438]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 00:56:50.926426 kubelet[1438]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:50.926763 kubelet[1438]: I0515 00:56:50.926509 1438 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:56:51.363061 kubelet[1438]: I0515 00:56:51.363023 1438 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 00:56:51.363061 kubelet[1438]: I0515 00:56:51.363050 1438 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:56:51.363319 kubelet[1438]: I0515 00:56:51.363302 1438 server.go:954] "Client rotation is on, will bootstrap in background" May 15 00:56:51.391711 kubelet[1438]: I0515 00:56:51.391679 1438 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:56:51.400146 kubelet[1438]: E0515 00:56:51.400095 1438 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 00:56:51.400146 kubelet[1438]: I0515 00:56:51.400126 1438 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 00:56:51.403978 kubelet[1438]: I0515 00:56:51.403946 1438 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:56:51.405012 kubelet[1438]: I0515 00:56:51.404974 1438 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:56:51.405163 kubelet[1438]: I0515 00:56:51.405009 1438 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.130","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 00:56:51.405163 kubelet[1438]: I0515 00:56:51.405163 1438 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:56:51.405271 kubelet[1438]: I0515 00:56:51.405172 1438 container_manager_linux.go:304] "Creating device plugin manager" May 15 00:56:51.405299 kubelet[1438]: I0515 00:56:51.405282 1438 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:51.408163 kubelet[1438]: I0515 00:56:51.408143 1438 kubelet.go:446] "Attempting to sync node with API server" May 15 00:56:51.408163 kubelet[1438]: I0515 00:56:51.408163 1438 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:56:51.408215 kubelet[1438]: I0515 00:56:51.408184 1438 kubelet.go:352] "Adding apiserver pod source" May 15 00:56:51.408215 kubelet[1438]: I0515 00:56:51.408197 1438 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:56:51.408323 kubelet[1438]: E0515 00:56:51.408296 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:51.408356 kubelet[1438]: E0515 00:56:51.408336 1438 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:51.421944 kubelet[1438]: I0515 00:56:51.421920 1438 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:56:51.422316 kubelet[1438]: I0515 00:56:51.422284 1438 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:56:51.424867 kubelet[1438]: W0515 00:56:51.424842 1438 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 00:56:51.431169 kubelet[1438]: I0515 00:56:51.431148 1438 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 00:56:51.431244 kubelet[1438]: I0515 00:56:51.431183 1438 server.go:1287] "Started kubelet" May 15 00:56:51.431328 kubelet[1438]: I0515 00:56:51.431287 1438 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:56:51.431428 kubelet[1438]: W0515 00:56:51.431342 1438 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 15 00:56:51.431428 kubelet[1438]: E0515 00:56:51.431379 1438 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 00:56:51.432272 kubelet[1438]: I0515 00:56:51.432245 1438 server.go:490] "Adding debug handlers to kubelet server" May 15 00:56:51.433000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:51.433000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:51.433000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000963d40 a1=c0004d0e88 a2=c000963d10 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:51.433000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:51.433000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:51.433000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00041bfa0 a1=c0004d0ea0 a2=c000963dd0 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:51.434543 kubelet[1438]: I0515 00:56:51.434274 1438 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:56:51.434543 kubelet[1438]: I0515 00:56:51.434307 1438 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 00:56:51.434543 kubelet[1438]: I0515 00:56:51.434352 1438 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:56:51.435978 kubelet[1438]: W0515 00:56:51.435960 1438 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.130" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 15 00:56:51.436036 kubelet[1438]: E0515 00:56:51.435985 1438 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.130\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 00:56:51.436491 kubelet[1438]: I0515 00:56:51.436305 1438 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 00:56:51.437524 kubelet[1438]: I0515 00:56:51.437465 1438 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:56:51.438210 kubelet[1438]: I0515 00:56:51.437663 1438 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:56:51.438210 kubelet[1438]: E0515 00:56:51.437734 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.438210 kubelet[1438]: I0515 00:56:51.437760 1438 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 00:56:51.438210 kubelet[1438]: I0515 00:56:51.437900 1438 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 00:56:51.438210 kubelet[1438]: I0515 00:56:51.437984 1438 reconciler.go:26] "Reconciler: start to sync state" May 15 00:56:51.440319 kubelet[1438]: E0515 00:56:51.439070 1438 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:56:51.441144 kubelet[1438]: I0515 00:56:51.441126 1438 factory.go:221] Registration of the containerd container factory successfully May 15 00:56:51.441144 kubelet[1438]: I0515 00:56:51.441141 1438 factory.go:221] Registration of the systemd container factory successfully May 15 00:56:51.441223 kubelet[1438]: I0515 00:56:51.441202 1438 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:56:51.449832 kubelet[1438]: E0515 00:56:51.449764 1438 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.130\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 15 00:56:51.451144 kubelet[1438]: W0515 00:56:51.450675 1438 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 15 00:56:51.452917 kubelet[1438]: E0515 00:56:51.452887 1438 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 15 00:56:51.452917 kubelet[1438]: E0515 00:56:51.449213 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.130.183f8d5d18d57b55 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.130,UID:10.0.0.130,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.130,},FirstTimestamp:2025-05-15 00:56:51.431160661 +0000 UTC m=+0.536845132,LastTimestamp:2025-05-15 00:56:51.431160661 +0000 UTC m=+0.536845132,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.130,}" May 15 00:56:51.453889 kubelet[1438]: E0515 00:56:51.453772 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.130.183f8d5d194e0257 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.130,UID:10.0.0.130,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.130,},FirstTimestamp:2025-05-15 00:56:51.439059543 +0000 UTC m=+0.544744024,LastTimestamp:2025-05-15 00:56:51.439059543 +0000 UTC m=+0.544744024,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.130,}" May 15 00:56:51.453889 kubelet[1438]: I0515 00:56:51.453880 1438 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 00:56:51.453981 kubelet[1438]: I0515 00:56:51.453893 1438 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 00:56:51.453981 kubelet[1438]: I0515 00:56:51.453907 1438 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:51.457478 kubelet[1438]: E0515 00:56:51.457423 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.130.183f8d5d1a27691f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.130,UID:10.0.0.130,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.0.0.130 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.0.0.130,},FirstTimestamp:2025-05-15 00:56:51.453307167 +0000 UTC m=+0.558991648,LastTimestamp:2025-05-15 00:56:51.453307167 +0000 UTC m=+0.558991648,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.130,}" May 15 00:56:51.461580 kubelet[1438]: E0515 00:56:51.461500 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.130.183f8d5d1a278c6c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.130,UID:10.0.0.130,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.130 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.130,},FirstTimestamp:2025-05-15 00:56:51.453316204 +0000 UTC m=+0.559000685,LastTimestamp:2025-05-15 00:56:51.453316204 +0000 UTC m=+0.559000685,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.130,}" May 15 00:56:51.462000 audit[1455]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:51.462000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc1dc5590 a2=0 a3=7ffdc1dc557c items=0 ppid=1438 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:56:51.463000 audit[1461]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:51.463000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd0d5410d0 a2=0 a3=7ffd0d5410bc items=0 ppid=1438 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:56:51.465198 kubelet[1438]: E0515 00:56:51.465126 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.130.183f8d5d1a279942 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.130,UID:10.0.0.130,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.0.0.130 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.0.0.130,},FirstTimestamp:2025-05-15 00:56:51.45331949 +0000 UTC m=+0.559003972,LastTimestamp:2025-05-15 00:56:51.45331949 +0000 UTC m=+0.559003972,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.130,}" May 15 00:56:51.538342 kubelet[1438]: E0515 00:56:51.538304 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.638543 kubelet[1438]: E0515 00:56:51.638480 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.676670 kubelet[1438]: E0515 00:56:51.676632 1438 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.130\" not found" node="10.0.0.130" May 15 00:56:51.738842 kubelet[1438]: E0515 00:56:51.738804 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.839194 kubelet[1438]: E0515 00:56:51.839174 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.939904 kubelet[1438]: E0515 00:56:51.939829 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:51.465000 audit[1463]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:51.465000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffddfdbbc20 a2=0 a3=7ffddfdbbc0c items=0 ppid=1438 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:51.974000 audit[1468]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:51.974000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff66f0cea0 a2=0 a3=7fff66f0ce8c items=0 ppid=1438 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:51.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:51.975893 kubelet[1438]: I0515 00:56:51.975843 1438 policy_none.go:49] "None policy: Start" May 15 00:56:51.975893 kubelet[1438]: I0515 00:56:51.975884 1438 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 00:56:51.975893 kubelet[1438]: I0515 00:56:51.975900 1438 state_mem.go:35] "Initializing new in-memory state store" May 15 00:56:52.011000 audit[1473]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:52.011000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc5c80a540 a2=0 a3=7ffc5c80a52c items=0 ppid=1438 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 00:56:52.012878 kubelet[1438]: I0515 00:56:52.012854 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:56:52.013177 systemd[1]: Created slice kubepods.slice. May 15 00:56:52.013765 kubelet[1438]: I0515 00:56:52.013749 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:56:52.013862 kubelet[1438]: I0515 00:56:52.013848 1438 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 00:56:52.013946 kubelet[1438]: I0515 00:56:52.013929 1438 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 00:56:52.014014 kubelet[1438]: I0515 00:56:52.014000 1438 kubelet.go:2388] "Starting kubelet main sync loop" May 15 00:56:52.014195 kubelet[1438]: E0515 00:56:52.014173 1438 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:56:52.012000 audit[1474]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:52.012000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcd4c5090 a2=0 a3=7ffdcd4c507c items=0 ppid=1438 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:56:52.012000 audit[1475]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:52.012000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe210800b0 a2=0 a3=7ffe2108009c items=0 ppid=1438 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:56:52.013000 audit[1476]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:52.013000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc3746ec30 a2=0 a3=7ffc3746ec1c items=0 ppid=1438 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:56:52.014000 audit[1477]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:52.014000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe278d4ab0 a2=0 a3=7ffe278d4a9c items=0 ppid=1438 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:56:52.014000 audit[1478]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:52.014000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce9878b40 a2=0 a3=7ffce9878b2c items=0 ppid=1438 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:56:52.015000 audit[1479]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:52.015000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeecffc2b0 a2=0 a3=7ffeecffc29c items=0 ppid=1438 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:56:52.016000 audit[1480]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:52.016000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb1e01660 a2=0 a3=7ffdb1e0164c items=0 ppid=1438 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:56:52.017347 systemd[1]: Created slice kubepods-burstable.slice. May 15 00:56:52.019573 systemd[1]: Created slice kubepods-besteffort.slice. May 15 00:56:52.025389 kubelet[1438]: I0515 00:56:52.025352 1438 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:56:52.024000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.024000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:52.024000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00099ccf0 a1=c000645488 a2=c00099ccc0 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:52.025619 kubelet[1438]: I0515 00:56:52.025417 1438 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:56:52.025619 kubelet[1438]: I0515 00:56:52.025513 1438 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 00:56:52.025619 kubelet[1438]: I0515 00:56:52.025526 1438 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:56:52.025776 kubelet[1438]: I0515 00:56:52.025750 1438 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:56:52.026670 kubelet[1438]: E0515 00:56:52.026648 1438 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 00:56:52.026726 kubelet[1438]: E0515 00:56:52.026682 1438 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.130\" not found" May 15 00:56:52.127082 kubelet[1438]: I0515 00:56:52.127049 1438 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.130" May 15 00:56:52.130849 kubelet[1438]: I0515 00:56:52.130827 1438 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.130" May 15 00:56:52.130891 kubelet[1438]: E0515 00:56:52.130853 1438 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.0.0.130\": node \"10.0.0.130\" not found" May 15 00:56:52.134633 kubelet[1438]: E0515 00:56:52.134601 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.235244 kubelet[1438]: E0515 00:56:52.235093 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.335800 kubelet[1438]: E0515 00:56:52.335719 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.371407 kubelet[1438]: I0515 00:56:52.371350 1438 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 00:56:52.371567 kubelet[1438]: W0515 00:56:52.371547 1438 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 00:56:52.408746 kubelet[1438]: E0515 00:56:52.408702 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:52.436551 kubelet[1438]: E0515 00:56:52.436497 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.537255 kubelet[1438]: E0515 00:56:52.537150 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.560434 sudo[1331]: pam_unix(sudo:session): session closed for user root May 15 00:56:52.559000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:52.559000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:52.561678 sshd[1327]: pam_unix(sshd:session): session closed for user core May 15 00:56:52.561000 audit[1327]: USER_END pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:52.561000 audit[1327]: CRED_DISP pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:52.563641 systemd[1]: sshd@6-10.0.0.130:22-10.0.0.1:53186.service: Deactivated successfully. May 15 00:56:52.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.130:22-10.0.0.1:53186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:52.564369 systemd[1]: session-7.scope: Deactivated successfully. May 15 00:56:52.564915 systemd-logind[1183]: Session 7 logged out. Waiting for processes to exit. May 15 00:56:52.565536 systemd-logind[1183]: Removed session 7. May 15 00:56:52.638217 kubelet[1438]: E0515 00:56:52.638157 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.738706 kubelet[1438]: E0515 00:56:52.738654 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.839559 kubelet[1438]: E0515 00:56:52.839435 1438 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.130\" not found" May 15 00:56:52.940406 kubelet[1438]: I0515 00:56:52.940390 1438 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 00:56:52.941020 env[1195]: time="2025-05-15T00:56:52.940981792Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 00:56:52.941241 kubelet[1438]: I0515 00:56:52.941214 1438 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 00:56:53.409737 kubelet[1438]: E0515 00:56:53.409716 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:53.409878 kubelet[1438]: I0515 00:56:53.409750 1438 apiserver.go:52] "Watching apiserver" May 15 00:56:53.411821 kubelet[1438]: E0515 00:56:53.411798 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:56:53.416300 systemd[1]: Created slice kubepods-besteffort-pode4948206_fe8d_4a98_93c0_c3e735dc4c0b.slice. May 15 00:56:53.426115 systemd[1]: Created slice kubepods-besteffort-poddc06f948_88dd_4ede_bb5a_1ef2a940934e.slice. May 15 00:56:53.438167 kubelet[1438]: I0515 00:56:53.438140 1438 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 00:56:53.447715 kubelet[1438]: I0515 00:56:53.447686 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1cf798ca-ca8a-443d-a705-3bc918c4cdd6-socket-dir\") pod \"csi-node-driver-x764r\" (UID: \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\") " pod="calico-system/csi-node-driver-x764r" May 15 00:56:53.447806 kubelet[1438]: I0515 00:56:53.447719 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-policysync\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.447806 kubelet[1438]: I0515 00:56:53.447733 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-net-dir\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.447806 kubelet[1438]: I0515 00:56:53.447747 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-lib-calico\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.447806 kubelet[1438]: I0515 00:56:53.447760 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e4948206-fe8d-4a98-93c0-c3e735dc4c0b-kube-proxy\") pod \"kube-proxy-s6kn2\" (UID: \"e4948206-fe8d-4a98-93c0-c3e735dc4c0b\") " pod="kube-system/kube-proxy-s6kn2" May 15 00:56:53.447806 kubelet[1438]: I0515 00:56:53.447772 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-lib-modules\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.447967 kubelet[1438]: I0515 00:56:53.447797 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-xtables-lock\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.447967 kubelet[1438]: I0515 00:56:53.447812 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4tt7\" (UniqueName: \"kubernetes.io/projected/1cf798ca-ca8a-443d-a705-3bc918c4cdd6-kube-api-access-p4tt7\") pod \"csi-node-driver-x764r\" (UID: \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\") " pod="calico-system/csi-node-driver-x764r" May 15 00:56:53.447967 kubelet[1438]: I0515 00:56:53.447896 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e4948206-fe8d-4a98-93c0-c3e735dc4c0b-xtables-lock\") pod \"kube-proxy-s6kn2\" (UID: \"e4948206-fe8d-4a98-93c0-c3e735dc4c0b\") " pod="kube-system/kube-proxy-s6kn2" May 15 00:56:53.447967 kubelet[1438]: I0515 00:56:53.447926 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e4948206-fe8d-4a98-93c0-c3e735dc4c0b-lib-modules\") pod \"kube-proxy-s6kn2\" (UID: \"e4948206-fe8d-4a98-93c0-c3e735dc4c0b\") " pod="kube-system/kube-proxy-s6kn2" May 15 00:56:53.447967 kubelet[1438]: I0515 00:56:53.447943 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-run-calico\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448114 kubelet[1438]: I0515 00:56:53.447965 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-bin-dir\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448114 kubelet[1438]: I0515 00:56:53.447978 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1cf798ca-ca8a-443d-a705-3bc918c4cdd6-varrun\") pod \"csi-node-driver-x764r\" (UID: \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\") " pod="calico-system/csi-node-driver-x764r" May 15 00:56:53.448114 kubelet[1438]: I0515 00:56:53.447991 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1cf798ca-ca8a-443d-a705-3bc918c4cdd6-kubelet-dir\") pod \"csi-node-driver-x764r\" (UID: \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\") " pod="calico-system/csi-node-driver-x764r" May 15 00:56:53.448114 kubelet[1438]: I0515 00:56:53.448003 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1cf798ca-ca8a-443d-a705-3bc918c4cdd6-registration-dir\") pod \"csi-node-driver-x764r\" (UID: \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\") " pod="calico-system/csi-node-driver-x764r" May 15 00:56:53.448114 kubelet[1438]: I0515 00:56:53.448036 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-log-dir\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448273 kubelet[1438]: I0515 00:56:53.448048 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxwkv\" (UniqueName: \"kubernetes.io/projected/dc06f948-88dd-4ede-bb5a-1ef2a940934e-kube-api-access-bxwkv\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448273 kubelet[1438]: I0515 00:56:53.448062 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-flexvol-driver-host\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448273 kubelet[1438]: I0515 00:56:53.448103 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pfch7\" (UniqueName: \"kubernetes.io/projected/e4948206-fe8d-4a98-93c0-c3e735dc4c0b-kube-api-access-pfch7\") pod \"kube-proxy-s6kn2\" (UID: \"e4948206-fe8d-4a98-93c0-c3e735dc4c0b\") " pod="kube-system/kube-proxy-s6kn2" May 15 00:56:53.448273 kubelet[1438]: I0515 00:56:53.448116 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc06f948-88dd-4ede-bb5a-1ef2a940934e-tigera-ca-bundle\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.448273 kubelet[1438]: I0515 00:56:53.448130 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dc06f948-88dd-4ede-bb5a-1ef2a940934e-node-certs\") pod \"calico-node-ck4fn\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " pod="calico-system/calico-node-ck4fn" May 15 00:56:53.551993 kubelet[1438]: I0515 00:56:53.550179 1438 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.553333 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558246 kubelet[1438]: W0515 00:56:53.553346 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.553359 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.553901 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558246 kubelet[1438]: W0515 00:56:53.553909 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.553917 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.555424 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558246 kubelet[1438]: W0515 00:56:53.555434 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558246 kubelet[1438]: E0515 00:56:53.555543 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558246 kubelet[1438]: W0515 00:56:53.555549 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.555587 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.555651 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558494 kubelet[1438]: W0515 00:56:53.555658 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.555751 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558494 kubelet[1438]: W0515 00:56:53.555757 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.555894 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558494 kubelet[1438]: W0515 00:56:53.555900 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.555998 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558494 kubelet[1438]: W0515 00:56:53.556003 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558494 kubelet[1438]: E0515 00:56:53.556096 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558702 kubelet[1438]: W0515 00:56:53.556101 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556108 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556130 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556141 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556149 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556158 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.556164 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.558064 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558702 kubelet[1438]: W0515 00:56:53.558076 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558702 kubelet[1438]: E0515 00:56:53.558097 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558267 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558919 kubelet[1438]: W0515 00:56:53.558273 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558285 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558389 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558919 kubelet[1438]: W0515 00:56:53.558395 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558411 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558603 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.558919 kubelet[1438]: W0515 00:56:53.558625 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558632 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.558919 kubelet[1438]: E0515 00:56:53.558742 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.559116 kubelet[1438]: W0515 00:56:53.558757 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.559116 kubelet[1438]: E0515 00:56:53.558764 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.559116 kubelet[1438]: E0515 00:56:53.558874 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.559116 kubelet[1438]: W0515 00:56:53.558880 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.559116 kubelet[1438]: E0515 00:56:53.558895 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.559116 kubelet[1438]: E0515 00:56:53.559046 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.559116 kubelet[1438]: W0515 00:56:53.559056 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.559116 kubelet[1438]: E0515 00:56:53.559065 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.559278 kubelet[1438]: E0515 00:56:53.559179 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.559278 kubelet[1438]: W0515 00:56:53.559194 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.559278 kubelet[1438]: E0515 00:56:53.559205 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.559343 kubelet[1438]: E0515 00:56:53.559307 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.559343 kubelet[1438]: W0515 00:56:53.559313 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.559343 kubelet[1438]: E0515 00:56:53.559329 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.559451 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561438 kubelet[1438]: W0515 00:56:53.559471 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.559480 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.560592 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561438 kubelet[1438]: W0515 00:56:53.560602 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.560618 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.560754 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561438 kubelet[1438]: W0515 00:56:53.560771 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.560778 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561438 kubelet[1438]: E0515 00:56:53.560902 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561672 kubelet[1438]: W0515 00:56:53.560918 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561672 kubelet[1438]: E0515 00:56:53.560927 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561672 kubelet[1438]: E0515 00:56:53.561037 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561672 kubelet[1438]: W0515 00:56:53.561052 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561672 kubelet[1438]: E0515 00:56:53.561061 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.561672 kubelet[1438]: E0515 00:56:53.561174 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:53.561672 kubelet[1438]: W0515 00:56:53.561189 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:53.561672 kubelet[1438]: E0515 00:56:53.561195 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:53.724991 kubelet[1438]: E0515 00:56:53.724864 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:53.725915 env[1195]: time="2025-05-15T00:56:53.725863075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s6kn2,Uid:e4948206-fe8d-4a98-93c0-c3e735dc4c0b,Namespace:kube-system,Attempt:0,}" May 15 00:56:53.728125 kubelet[1438]: E0515 00:56:53.728099 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:53.728643 env[1195]: time="2025-05-15T00:56:53.728587307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ck4fn,Uid:dc06f948-88dd-4ede-bb5a-1ef2a940934e,Namespace:calico-system,Attempt:0,}" May 15 00:56:54.410146 kubelet[1438]: E0515 00:56:54.410085 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:54.622672 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3532056779.mount: Deactivated successfully. May 15 00:56:54.630265 env[1195]: time="2025-05-15T00:56:54.630219646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.632158 env[1195]: time="2025-05-15T00:56:54.632109913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.636453 env[1195]: time="2025-05-15T00:56:54.636390425Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.637685 env[1195]: time="2025-05-15T00:56:54.637647243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.639222 env[1195]: time="2025-05-15T00:56:54.639170030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.640457 env[1195]: time="2025-05-15T00:56:54.640412812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.641767 env[1195]: time="2025-05-15T00:56:54.641733431Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.642945 env[1195]: time="2025-05-15T00:56:54.642913655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:54.663490 env[1195]: time="2025-05-15T00:56:54.663339683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:54.663490 env[1195]: time="2025-05-15T00:56:54.663377745Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:54.663490 env[1195]: time="2025-05-15T00:56:54.663388134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:54.663676 env[1195]: time="2025-05-15T00:56:54.663530802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262 pid=1519 runtime=io.containerd.runc.v2 May 15 00:56:54.675891 env[1195]: time="2025-05-15T00:56:54.675571565Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:54.675891 env[1195]: time="2025-05-15T00:56:54.675636116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:54.675891 env[1195]: time="2025-05-15T00:56:54.675656234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:54.675945 systemd[1]: Started cri-containerd-369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262.scope. May 15 00:56:54.676896 env[1195]: time="2025-05-15T00:56:54.676258354Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48ea22a4579c3e5e3689c92afe21ed3a5ee7d282323f2aae666d02674b9a4800 pid=1547 runtime=io.containerd.runc.v2 May 15 00:56:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit: BPF prog-id=55 op=LOAD May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1519 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393634316436636134666439386466386136323065653239383233 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1519 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393634316436636134666439386466386136323065653239383233 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit: BPF prog-id=56 op=LOAD May 15 00:56:54.686000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccab0 items=0 ppid=1519 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393634316436636134666439386466386136323065653239383233 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit: BPF prog-id=57 op=LOAD May 15 00:56:54.686000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccaf8 items=0 ppid=1519 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393634316436636134666439386466386136323065653239383233 May 15 00:56:54.686000 audit: BPF prog-id=57 op=UNLOAD May 15 00:56:54.686000 audit: BPF prog-id=56 op=UNLOAD May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.686000 audit: BPF prog-id=58 op=LOAD May 15 00:56:54.686000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ccf08 items=0 ppid=1519 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393634316436636134666439386466386136323065653239383233 May 15 00:56:54.689571 systemd[1]: Started cri-containerd-48ea22a4579c3e5e3689c92afe21ed3a5ee7d282323f2aae666d02674b9a4800.scope. May 15 00:56:54.699904 env[1195]: time="2025-05-15T00:56:54.699855833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ck4fn,Uid:dc06f948-88dd-4ede-bb5a-1ef2a940934e,Namespace:calico-system,Attempt:0,} returns sandbox id \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\"" May 15 00:56:54.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit: BPF prog-id=59 op=LOAD May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1547 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656132326134353739633365356533363839633932616665323165 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1547 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656132326134353739633365356533363839633932616665323165 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit: BPF prog-id=60 op=LOAD May 15 00:56:54.699000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b3b0 items=0 ppid=1547 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656132326134353739633365356533363839633932616665323165 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.699000 audit: BPF prog-id=61 op=LOAD May 15 00:56:54.699000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b3f8 items=0 ppid=1547 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656132326134353739633365356533363839633932616665323165 May 15 00:56:54.700000 audit: BPF prog-id=61 op=UNLOAD May 15 00:56:54.700000 audit: BPF prog-id=60 op=UNLOAD May 15 00:56:54.700000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:54.700000 audit: BPF prog-id=62 op=LOAD May 15 00:56:54.700000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b808 items=0 ppid=1547 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:54.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656132326134353739633365356533363839633932616665323165 May 15 00:56:54.702470 kubelet[1438]: E0515 00:56:54.702420 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:54.705615 env[1195]: time="2025-05-15T00:56:54.705564856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 00:56:54.710839 env[1195]: time="2025-05-15T00:56:54.710811491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s6kn2,Uid:e4948206-fe8d-4a98-93c0-c3e735dc4c0b,Namespace:kube-system,Attempt:0,} returns sandbox id \"48ea22a4579c3e5e3689c92afe21ed3a5ee7d282323f2aae666d02674b9a4800\"" May 15 00:56:54.711466 kubelet[1438]: E0515 00:56:54.711438 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:55.014558 kubelet[1438]: E0515 00:56:55.014424 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:56:55.410597 kubelet[1438]: E0515 00:56:55.410467 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:56.030498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount117107457.mount: Deactivated successfully. May 15 00:56:56.157908 env[1195]: time="2025-05-15T00:56:56.157838773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:56.159886 env[1195]: time="2025-05-15T00:56:56.159851300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:56.161423 env[1195]: time="2025-05-15T00:56:56.161376462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:56.162695 env[1195]: time="2025-05-15T00:56:56.162659259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:56.163099 env[1195]: time="2025-05-15T00:56:56.163070571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 00:56:56.164490 env[1195]: time="2025-05-15T00:56:56.164457293Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 00:56:56.165319 env[1195]: time="2025-05-15T00:56:56.165286689Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:56:56.180074 env[1195]: time="2025-05-15T00:56:56.180027038Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\"" May 15 00:56:56.180701 env[1195]: time="2025-05-15T00:56:56.180669694Z" level=info msg="StartContainer for \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\"" May 15 00:56:56.195854 systemd[1]: Started cri-containerd-a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9.scope. May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.210345 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 00:56:56.210414 kernel: audit: type=1400 audit(1747270616.208:438): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdde9a8c228 items=0 ppid=1519 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:56.217747 kernel: audit: type=1300 audit(1747270616.208:438): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdde9a8c228 items=0 ppid=1519 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:56.217813 kernel: audit: type=1327 audit(1747270616.208:438): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343439313637666265646664636131333535356538633065666331 May 15 00:56:56.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343439313637666265646664636131333535356538633065666331 May 15 00:56:56.221754 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.224730 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.230542 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.230631 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.236485 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.236545 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.238848 env[1195]: time="2025-05-15T00:56:56.238814088Z" level=info msg="StartContainer for \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\" returns successfully" May 15 00:56:56.239841 kernel: audit: type=1400 audit(1747270616.208:439): avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.208000 audit: BPF prog-id=63 op=LOAD May 15 00:56:56.208000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ae448 items=0 ppid=1519 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:56.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343439313637666265646664636131333535356538633065666331 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.212000 audit: BPF prog-id=64 op=LOAD May 15 00:56:56.212000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ae498 items=0 ppid=1519 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:56.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343439313637666265646664636131333535356538633065666331 May 15 00:56:56.216000 audit: BPF prog-id=64 op=UNLOAD May 15 00:56:56.217000 audit: BPF prog-id=63 op=UNLOAD May 15 00:56:56.217000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:56.217000 audit: BPF prog-id=65 op=LOAD May 15 00:56:56.217000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ae528 items=0 ppid=1519 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:56.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343439313637666265646664636131333535356538633065666331 May 15 00:56:56.253648 systemd[1]: cri-containerd-a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9.scope: Deactivated successfully. May 15 00:56:56.257000 audit: BPF prog-id=65 op=UNLOAD May 15 00:56:56.338663 env[1195]: time="2025-05-15T00:56:56.338530308Z" level=info msg="shim disconnected" id=a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9 May 15 00:56:56.338663 env[1195]: time="2025-05-15T00:56:56.338597003Z" level=warning msg="cleaning up after shim disconnected" id=a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9 namespace=k8s.io May 15 00:56:56.338663 env[1195]: time="2025-05-15T00:56:56.338616470Z" level=info msg="cleaning up dead shim" May 15 00:56:56.345056 env[1195]: time="2025-05-15T00:56:56.345013243Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:56:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1640 runtime=io.containerd.runc.v2\n" May 15 00:56:56.411504 kubelet[1438]: E0515 00:56:56.411468 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:57.014989 kubelet[1438]: E0515 00:56:57.014920 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:56:57.024465 kubelet[1438]: E0515 00:56:57.024444 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:57.412389 kubelet[1438]: E0515 00:56:57.412336 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:58.163317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2638285264.mount: Deactivated successfully. May 15 00:56:58.413607 kubelet[1438]: E0515 00:56:58.413449 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:56:58.789173 env[1195]: time="2025-05-15T00:56:58.789124352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:58.791222 env[1195]: time="2025-05-15T00:56:58.791173507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:58.792732 env[1195]: time="2025-05-15T00:56:58.792698739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:58.794066 env[1195]: time="2025-05-15T00:56:58.794020710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:58.794409 env[1195]: time="2025-05-15T00:56:58.794376618Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 15 00:56:58.795472 env[1195]: time="2025-05-15T00:56:58.795438801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 00:56:58.796467 env[1195]: time="2025-05-15T00:56:58.796432996Z" level=info msg="CreateContainer within sandbox \"48ea22a4579c3e5e3689c92afe21ed3a5ee7d282323f2aae666d02674b9a4800\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 00:56:58.810751 env[1195]: time="2025-05-15T00:56:58.810717350Z" level=info msg="CreateContainer within sandbox \"48ea22a4579c3e5e3689c92afe21ed3a5ee7d282323f2aae666d02674b9a4800\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fe763333fced7751b8248d22171dc5ce9c5b6bd342694619adacc3ae28eac3bd\"" May 15 00:56:58.811177 env[1195]: time="2025-05-15T00:56:58.811140885Z" level=info msg="StartContainer for \"fe763333fced7751b8248d22171dc5ce9c5b6bd342694619adacc3ae28eac3bd\"" May 15 00:56:58.826644 systemd[1]: Started cri-containerd-fe763333fced7751b8248d22171dc5ce9c5b6bd342694619adacc3ae28eac3bd.scope. May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff75296a928 items=0 ppid=1547 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665373633333333666365643737353162383234386432323137316463 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit: BPF prog-id=66 op=LOAD May 15 00:56:58.836000 audit[1664]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002727b8 items=0 ppid=1547 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665373633333333666365643737353162383234386432323137316463 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit: BPF prog-id=67 op=LOAD May 15 00:56:58.836000 audit[1664]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000272808 items=0 ppid=1547 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665373633333333666365643737353162383234386432323137316463 May 15 00:56:58.836000 audit: BPF prog-id=67 op=UNLOAD May 15 00:56:58.836000 audit: BPF prog-id=66 op=UNLOAD May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { perfmon } for pid=1664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit[1664]: AVC avc: denied { bpf } for pid=1664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:58.836000 audit: BPF prog-id=68 op=LOAD May 15 00:56:58.836000 audit[1664]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000272898 items=0 ppid=1547 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665373633333333666365643737353162383234386432323137316463 May 15 00:56:58.853357 env[1195]: time="2025-05-15T00:56:58.853297088Z" level=info msg="StartContainer for \"fe763333fced7751b8248d22171dc5ce9c5b6bd342694619adacc3ae28eac3bd\" returns successfully" May 15 00:56:58.953000 audit[1725]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:58.953000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe174800d0 a2=0 a3=7ffe174800bc items=0 ppid=1675 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:56:58.955000 audit[1727]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:58.955000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdee869d30 a2=0 a3=7ffdee869d1c items=0 ppid=1675 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:56:58.955000 audit[1726]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:58.955000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe945e98b0 a2=0 a3=7ffe945e989c items=0 ppid=1675 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:56:58.956000 audit[1729]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:58.956000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc1e7a2e0 a2=0 a3=7fffc1e7a2cc items=0 ppid=1675 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:56:58.957000 audit[1730]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:58.957000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff56da0200 a2=0 a3=7fff56da01ec items=0 ppid=1675 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:56:58.958000 audit[1731]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:58.958000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceab6c960 a2=0 a3=7ffceab6c94c items=0 ppid=1675 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:56:59.015039 kubelet[1438]: E0515 00:56:59.014963 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:56:59.028552 kubelet[1438]: E0515 00:56:59.028522 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:59.056000 audit[1732]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.056000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce67ae170 a2=0 a3=7ffce67ae15c items=0 ppid=1675 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:56:59.058000 audit[1734]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.058000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3851d8b0 a2=0 a3=7ffc3851d89c items=0 ppid=1675 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 00:56:59.062000 audit[1737]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.062000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8de48fb0 a2=0 a3=7ffe8de48f9c items=0 ppid=1675 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 00:56:59.063000 audit[1738]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.063000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe17d93110 a2=0 a3=7ffe17d930fc items=0 ppid=1675 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:56:59.065000 audit[1740]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.065000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd03222580 a2=0 a3=7ffd0322256c items=0 ppid=1675 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:56:59.066000 audit[1741]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.066000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd49a21220 a2=0 a3=7ffd49a2120c items=0 ppid=1675 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:56:59.068000 audit[1743]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.068000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd84c053f0 a2=0 a3=7ffd84c053dc items=0 ppid=1675 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:56:59.071000 audit[1746]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.071000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce7bfac20 a2=0 a3=7ffce7bfac0c items=0 ppid=1675 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 00:56:59.072000 audit[1747]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.072000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe88a4d740 a2=0 a3=7ffe88a4d72c items=0 ppid=1675 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:56:59.074000 audit[1749]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.074000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8439f2e0 a2=0 a3=7fff8439f2cc items=0 ppid=1675 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:56:59.075000 audit[1750]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.075000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9890a4b0 a2=0 a3=7ffc9890a49c items=0 ppid=1675 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:56:59.078000 audit[1752]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.078000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1b9a9330 a2=0 a3=7fff1b9a931c items=0 ppid=1675 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:59.081000 audit[1755]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.081000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1488fbd0 a2=0 a3=7ffe1488fbbc items=0 ppid=1675 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:59.084000 audit[1758]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.084000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe320ef1c0 a2=0 a3=7ffe320ef1ac items=0 ppid=1675 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:56:59.085000 audit[1759]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.085000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe346b4950 a2=0 a3=7ffe346b493c items=0 ppid=1675 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:56:59.087000 audit[1761]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.087000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc25923ed0 a2=0 a3=7ffc25923ebc items=0 ppid=1675 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:59.110000 audit[1765]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.110000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe82537ff0 a2=0 a3=7ffe82537fdc items=0 ppid=1675 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:59.111000 audit[1766]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.111000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcea73c320 a2=0 a3=7ffcea73c30c items=0 ppid=1675 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:56:59.113000 audit[1768]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:59.113000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe15682970 a2=0 a3=7ffe1568295c items=0 ppid=1675 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:56:59.133000 audit[1774]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:59.133000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcd3bdb910 a2=0 a3=7ffcd3bdb8fc items=0 ppid=1675 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:59.149000 audit[1774]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:59.149000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcd3bdb910 a2=0 a3=7ffcd3bdb8fc items=0 ppid=1675 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:59.150000 audit[1781]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.150000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd31b609b0 a2=0 a3=7ffd31b6099c items=0 ppid=1675 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:56:59.152000 audit[1783]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.152000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec577ed60 a2=0 a3=7ffec577ed4c items=0 ppid=1675 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 00:56:59.156000 audit[1786]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.156000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf29a07c0 a2=0 a3=7ffdf29a07ac items=0 ppid=1675 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 00:56:59.157000 audit[1787]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.157000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea7076ca0 a2=0 a3=7ffea7076c8c items=0 ppid=1675 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:56:59.159000 audit[1789]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.159000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe95bc3b10 a2=0 a3=7ffe95bc3afc items=0 ppid=1675 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:56:59.160000 audit[1790]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.160000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc63915b90 a2=0 a3=7ffc63915b7c items=0 ppid=1675 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:56:59.162000 audit[1792]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.162000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc83d35b00 a2=0 a3=7ffc83d35aec items=0 ppid=1675 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 00:56:59.165000 audit[1795]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.165000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff6739cc40 a2=0 a3=7fff6739cc2c items=0 ppid=1675 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:56:59.166000 audit[1796]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.166000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc53f8c840 a2=0 a3=7ffc53f8c82c items=0 ppid=1675 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:56:59.168000 audit[1798]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.168000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbb8a73c0 a2=0 a3=7ffcbb8a73ac items=0 ppid=1675 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:56:59.169000 audit[1799]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.169000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7ac69f70 a2=0 a3=7fff7ac69f5c items=0 ppid=1675 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:56:59.171000 audit[1801]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.171000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc72a86e20 a2=0 a3=7ffc72a86e0c items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:59.174000 audit[1804]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.174000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd89d31e60 a2=0 a3=7ffd89d31e4c items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:56:59.177000 audit[1807]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.177000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe369e0230 a2=0 a3=7ffe369e021c items=0 ppid=1675 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 00:56:59.178000 audit[1808]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.178000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffa1e2130 a2=0 a3=7ffffa1e211c items=0 ppid=1675 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:56:59.180000 audit[1810]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.180000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff1d4d2800 a2=0 a3=7fff1d4d27ec items=0 ppid=1675 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:59.183000 audit[1813]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.183000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff2066a180 a2=0 a3=7fff2066a16c items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:59.184000 audit[1814]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.184000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0228f6e0 a2=0 a3=7ffc0228f6cc items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:56:59.186000 audit[1816]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.186000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe86ae6850 a2=0 a3=7ffe86ae683c items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:56:59.187000 audit[1817]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.187000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe78e05a60 a2=0 a3=7ffe78e05a4c items=0 ppid=1675 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:56:59.188000 audit[1819]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.188000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcff334190 a2=0 a3=7ffcff33417c items=0 ppid=1675 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:59.191000 audit[1822]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:59.191000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd92d21270 a2=0 a3=7ffd92d2125c items=0 ppid=1675 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:59.193000 audit[1824]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:56:59.193000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe366135e0 a2=0 a3=7ffe366135cc items=0 ppid=1675 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.193000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:59.194000 audit[1824]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:56:59.194000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe366135e0 a2=0 a3=7ffe366135cc items=0 ppid=1675 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:59.194000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:59.198242 kubelet[1438]: I0515 00:56:59.198165 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-s6kn2" podStartSLOduration=3.115069191 podStartE2EDuration="7.198143657s" podCreationTimestamp="2025-05-15 00:56:52 +0000 UTC" firstStartedPulling="2025-05-15 00:56:54.712117151 +0000 UTC m=+3.817801622" lastFinishedPulling="2025-05-15 00:56:58.795191617 +0000 UTC m=+7.900876088" observedRunningTime="2025-05-15 00:56:59.197996902 +0000 UTC m=+8.303681393" watchObservedRunningTime="2025-05-15 00:56:59.198143657 +0000 UTC m=+8.303828129" May 15 00:56:59.414815 kubelet[1438]: E0515 00:56:59.414603 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:00.029387 kubelet[1438]: E0515 00:57:00.029352 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:00.415805 kubelet[1438]: E0515 00:57:00.415679 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:01.014727 kubelet[1438]: E0515 00:57:01.014687 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:01.416639 kubelet[1438]: E0515 00:57:01.416604 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:02.002000 audit[1826]: NETFILTER_CFG table=filter:65 family=2 entries=17 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.013091 kernel: kauditd_printk_skb: 230 callbacks suppressed May 15 00:57:02.013181 kernel: audit: type=1325 audit(1747270622.002:502): table=filter:65 family=2 entries=17 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.013210 kernel: audit: type=1300 audit(1747270622.002:502): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdc2060210 a2=0 a3=7ffdc20601fc items=0 ppid=1675 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.013233 kernel: audit: type=1327 audit(1747270622.002:502): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.002000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdc2060210 a2=0 a3=7ffdc20601fc items=0 ppid=1675 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.014000 audit[1826]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.014000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdc2060210 a2=0 a3=7ffdc20601fc items=0 ppid=1675 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.022671 kernel: audit: type=1325 audit(1747270622.014:503): table=nat:66 family=2 entries=19 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.022873 kernel: audit: type=1300 audit(1747270622.014:503): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdc2060210 a2=0 a3=7ffdc20601fc items=0 ppid=1675 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.022913 kernel: audit: type=1327 audit(1747270622.014:503): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.035000 audit[1828]: NETFILTER_CFG table=filter:67 family=2 entries=17 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.035000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff495bad70 a2=0 a3=7fff495bad5c items=0 ppid=1675 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.043733 kernel: audit: type=1325 audit(1747270622.035:504): table=filter:67 family=2 entries=17 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.043819 kernel: audit: type=1300 audit(1747270622.035:504): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff495bad70 a2=0 a3=7fff495bad5c items=0 ppid=1675 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.043843 kernel: audit: type=1327 audit(1747270622.035:504): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.047000 audit[1828]: NETFILTER_CFG table=nat:68 family=2 entries=19 op=nft_unregister_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.047000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7fff495bad70 a2=0 a3=0 items=0 ppid=1675 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.051809 kernel: audit: type=1325 audit(1747270622.047:505): table=nat:68 family=2 entries=19 op=nft_unregister_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.416740 kubelet[1438]: E0515 00:57:02.416706 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:03.014589 kubelet[1438]: E0515 00:57:03.014524 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:03.058000 audit[1830]: NETFILTER_CFG table=filter:69 family=2 entries=17 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.058000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd69be3820 a2=0 a3=7ffd69be380c items=0 ppid=1675 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.065000 audit[1830]: NETFILTER_CFG table=nat:70 family=2 entries=19 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.065000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd69be3820 a2=0 a3=7ffd69be380c items=0 ppid=1675 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.395700 env[1195]: time="2025-05-15T00:57:03.395642683Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:03.397538 env[1195]: time="2025-05-15T00:57:03.397501672Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:03.399070 env[1195]: time="2025-05-15T00:57:03.399046530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:03.400523 env[1195]: time="2025-05-15T00:57:03.400467717Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:03.400838 env[1195]: time="2025-05-15T00:57:03.400806864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 00:57:03.402704 env[1195]: time="2025-05-15T00:57:03.402676622Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:57:03.417886 kubelet[1438]: E0515 00:57:03.417847 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:03.419280 env[1195]: time="2025-05-15T00:57:03.419231907Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\"" May 15 00:57:03.419715 env[1195]: time="2025-05-15T00:57:03.419677112Z" level=info msg="StartContainer for \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\"" May 15 00:57:03.436341 systemd[1]: run-containerd-runc-k8s.io-e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7-runc.NjJ1UK.mount: Deactivated successfully. May 15 00:57:03.437551 systemd[1]: Started cri-containerd-e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7.scope. May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1816e392f8 items=0 ppid=1519 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323963343531326630363133346636653636343665336238623263 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit: BPF prog-id=69 op=LOAD May 15 00:57:03.449000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024408 items=0 ppid=1519 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323963343531326630363133346636653636343665336238623263 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit: BPF prog-id=70 op=LOAD May 15 00:57:03.449000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024458 items=0 ppid=1519 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323963343531326630363133346636653636343665336238623263 May 15 00:57:03.449000 audit: BPF prog-id=70 op=UNLOAD May 15 00:57:03.449000 audit: BPF prog-id=69 op=UNLOAD May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:03.449000 audit: BPF prog-id=71 op=LOAD May 15 00:57:03.449000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000244e8 items=0 ppid=1519 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323963343531326630363133346636653636343665336238623263 May 15 00:57:03.462348 env[1195]: time="2025-05-15T00:57:03.462297186Z" level=info msg="StartContainer for \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\" returns successfully" May 15 00:57:04.038345 kubelet[1438]: E0515 00:57:04.038296 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:04.233993 env[1195]: time="2025-05-15T00:57:04.233925982Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:57:04.235451 systemd[1]: cri-containerd-e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7.scope: Deactivated successfully. May 15 00:57:04.240000 audit: BPF prog-id=71 op=UNLOAD May 15 00:57:04.243409 kubelet[1438]: I0515 00:57:04.243178 1438 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 00:57:04.412945 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7-rootfs.mount: Deactivated successfully. May 15 00:57:04.418146 kubelet[1438]: E0515 00:57:04.418119 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:04.574236 env[1195]: time="2025-05-15T00:57:04.574171648Z" level=info msg="shim disconnected" id=e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7 May 15 00:57:04.574236 env[1195]: time="2025-05-15T00:57:04.574225039Z" level=warning msg="cleaning up after shim disconnected" id=e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7 namespace=k8s.io May 15 00:57:04.574236 env[1195]: time="2025-05-15T00:57:04.574238303Z" level=info msg="cleaning up dead shim" May 15 00:57:04.579869 env[1195]: time="2025-05-15T00:57:04.579838953Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1881 runtime=io.containerd.runc.v2\n" May 15 00:57:05.018330 systemd[1]: Created slice kubepods-besteffort-pod1cf798ca_ca8a_443d_a705_3bc918c4cdd6.slice. May 15 00:57:05.020016 env[1195]: time="2025-05-15T00:57:05.019985666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x764r,Uid:1cf798ca-ca8a-443d-a705-3bc918c4cdd6,Namespace:calico-system,Attempt:0,}" May 15 00:57:05.041266 kubelet[1438]: E0515 00:57:05.041235 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:05.041893 env[1195]: time="2025-05-15T00:57:05.041867025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 00:57:05.072432 env[1195]: time="2025-05-15T00:57:05.072343462Z" level=error msg="Failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:05.072748 env[1195]: time="2025-05-15T00:57:05.072712625Z" level=error msg="encountered an error cleaning up failed sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:05.072803 env[1195]: time="2025-05-15T00:57:05.072767187Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x764r,Uid:1cf798ca-ca8a-443d-a705-3bc918c4cdd6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:05.073063 kubelet[1438]: E0515 00:57:05.072985 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:05.073136 kubelet[1438]: E0515 00:57:05.073079 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x764r" May 15 00:57:05.073136 kubelet[1438]: E0515 00:57:05.073097 1438 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x764r" May 15 00:57:05.073211 kubelet[1438]: E0515 00:57:05.073134 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x764r_calico-system(1cf798ca-ca8a-443d-a705-3bc918c4cdd6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x764r_calico-system(1cf798ca-ca8a-443d-a705-3bc918c4cdd6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:05.073841 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326-shm.mount: Deactivated successfully. May 15 00:57:05.419166 kubelet[1438]: E0515 00:57:05.419129 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:06.042570 kubelet[1438]: I0515 00:57:06.042538 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:06.043145 env[1195]: time="2025-05-15T00:57:06.043099085Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:06.064300 env[1195]: time="2025-05-15T00:57:06.064242690Z" level=error msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" failed" error="failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:06.064491 kubelet[1438]: E0515 00:57:06.064449 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:06.064554 kubelet[1438]: E0515 00:57:06.064514 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326"} May 15 00:57:06.064582 kubelet[1438]: E0515 00:57:06.064569 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:06.064645 kubelet[1438]: E0515 00:57:06.064590 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:06.420329 kubelet[1438]: E0515 00:57:06.420208 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:07.420574 kubelet[1438]: E0515 00:57:07.420507 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:08.421552 kubelet[1438]: E0515 00:57:08.421485 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:08.712416 systemd[1]: Created slice kubepods-besteffort-podce95b523_0ce5_4400_93e0_2fd7f181d579.slice. May 15 00:57:08.742298 kubelet[1438]: I0515 00:57:08.742242 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-55lm6\" (UniqueName: \"kubernetes.io/projected/ce95b523-0ce5-4400-93e0-2fd7f181d579-kube-api-access-55lm6\") pod \"nginx-deployment-7fcdb87857-l6cwl\" (UID: \"ce95b523-0ce5-4400-93e0-2fd7f181d579\") " pod="default/nginx-deployment-7fcdb87857-l6cwl" May 15 00:57:09.015848 env[1195]: time="2025-05-15T00:57:09.015495474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l6cwl,Uid:ce95b523-0ce5-4400-93e0-2fd7f181d579,Namespace:default,Attempt:0,}" May 15 00:57:09.357246 env[1195]: time="2025-05-15T00:57:09.357176764Z" level=error msg="Failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.358943 env[1195]: time="2025-05-15T00:57:09.357510370Z" level=error msg="encountered an error cleaning up failed sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.358943 env[1195]: time="2025-05-15T00:57:09.357552810Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l6cwl,Uid:ce95b523-0ce5-4400-93e0-2fd7f181d579,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.358774 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd-shm.mount: Deactivated successfully. May 15 00:57:09.359103 kubelet[1438]: E0515 00:57:09.357762 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.359103 kubelet[1438]: E0515 00:57:09.357848 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-l6cwl" May 15 00:57:09.359103 kubelet[1438]: E0515 00:57:09.357882 1438 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-l6cwl" May 15 00:57:09.359189 kubelet[1438]: E0515 00:57:09.357932 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-l6cwl_default(ce95b523-0ce5-4400-93e0-2fd7f181d579)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-l6cwl_default(ce95b523-0ce5-4400-93e0-2fd7f181d579)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-l6cwl" podUID="ce95b523-0ce5-4400-93e0-2fd7f181d579" May 15 00:57:09.422377 kubelet[1438]: E0515 00:57:09.422319 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:10.049193 kubelet[1438]: I0515 00:57:10.049151 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:10.049818 env[1195]: time="2025-05-15T00:57:10.049766980Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:10.080121 env[1195]: time="2025-05-15T00:57:10.080034926Z" level=error msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" failed" error="failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:10.080338 kubelet[1438]: E0515 00:57:10.080282 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:10.080401 kubelet[1438]: E0515 00:57:10.080344 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd"} May 15 00:57:10.080401 kubelet[1438]: E0515 00:57:10.080380 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:10.080499 kubelet[1438]: E0515 00:57:10.080405 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-l6cwl" podUID="ce95b523-0ce5-4400-93e0-2fd7f181d579" May 15 00:57:10.422588 kubelet[1438]: E0515 00:57:10.422444 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:10.943571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2011592919.mount: Deactivated successfully. May 15 00:57:11.260255 env[1195]: time="2025-05-15T00:57:11.260131513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:11.262259 env[1195]: time="2025-05-15T00:57:11.262229339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:11.263811 env[1195]: time="2025-05-15T00:57:11.263760743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:11.265211 env[1195]: time="2025-05-15T00:57:11.265160970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:11.265453 env[1195]: time="2025-05-15T00:57:11.265423783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 00:57:11.275705 env[1195]: time="2025-05-15T00:57:11.275669028Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:57:11.289672 env[1195]: time="2025-05-15T00:57:11.289629273Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3\"" May 15 00:57:11.290140 env[1195]: time="2025-05-15T00:57:11.290112229Z" level=info msg="StartContainer for \"e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3\"" May 15 00:57:11.303554 systemd[1]: Started cri-containerd-e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3.scope. May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.318159 kernel: kauditd_printk_skb: 52 callbacks suppressed May 15 00:57:11.318214 kernel: audit: type=1400 audit(1747270631.316:515): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1e46de9098 items=0 ppid=1519 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:11.326310 kernel: audit: type=1300 audit(1747270631.316:515): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1e46de9098 items=0 ppid=1519 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:11.326354 kernel: audit: type=1327 audit(1747270631.316:515): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643163353261646136373834373431343263653431626136663931 May 15 00:57:11.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643163353261646136373834373431343263653431626136663931 May 15 00:57:11.330684 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.333827 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.340752 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.349133 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.349283 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.354815 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.354922 kernel: audit: type=1400 audit(1747270631.316:516): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.316000 audit: BPF prog-id=72 op=LOAD May 15 00:57:11.316000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d00f8 items=0 ppid=1519 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:11.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643163353261646136373834373431343263653431626136663931 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.320000 audit: BPF prog-id=73 op=LOAD May 15 00:57:11.320000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d0148 items=0 ppid=1519 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:11.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643163353261646136373834373431343263653431626136663931 May 15 00:57:11.329000 audit: BPF prog-id=73 op=UNLOAD May 15 00:57:11.329000 audit: BPF prog-id=72 op=UNLOAD May 15 00:57:11.329000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:11.329000 audit: BPF prog-id=74 op=LOAD May 15 00:57:11.329000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d01d8 items=0 ppid=1519 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:11.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643163353261646136373834373431343263653431626136663931 May 15 00:57:11.358240 env[1195]: time="2025-05-15T00:57:11.357176771Z" level=info msg="StartContainer for \"e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3\" returns successfully" May 15 00:57:11.409048 kubelet[1438]: E0515 00:57:11.408990 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:11.414378 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 00:57:11.414458 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 00:57:11.422810 kubelet[1438]: E0515 00:57:11.422762 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:11.433468 systemd[1]: cri-containerd-e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3.scope: Deactivated successfully. May 15 00:57:11.436000 audit: BPF prog-id=74 op=UNLOAD May 15 00:57:12.010537 env[1195]: time="2025-05-15T00:57:12.010487341Z" level=info msg="shim disconnected" id=e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3 May 15 00:57:12.010537 env[1195]: time="2025-05-15T00:57:12.010536654Z" level=warning msg="cleaning up after shim disconnected" id=e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3 namespace=k8s.io May 15 00:57:12.010537 env[1195]: time="2025-05-15T00:57:12.010545460Z" level=info msg="cleaning up dead shim" May 15 00:57:12.016327 env[1195]: time="2025-05-15T00:57:12.016272026Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2077 runtime=io.containerd.runc.v2\n" May 15 00:57:12.054876 kubelet[1438]: I0515 00:57:12.054846 1438 scope.go:117] "RemoveContainer" containerID="e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3" May 15 00:57:12.055033 kubelet[1438]: E0515 00:57:12.054931 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:12.056565 env[1195]: time="2025-05-15T00:57:12.056520780Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 00:57:12.071413 env[1195]: time="2025-05-15T00:57:12.071371676Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d\"" May 15 00:57:12.071808 env[1195]: time="2025-05-15T00:57:12.071779672Z" level=info msg="StartContainer for \"b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d\"" May 15 00:57:12.086730 systemd[1]: Started cri-containerd-b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d.scope. May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f13fc457608 items=0 ppid=1519 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:12.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633661616231656231356463663832316235626632613938353032 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.096000 audit: BPF prog-id=75 op=LOAD May 15 00:57:12.096000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031c9e8 items=0 ppid=1519 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:12.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633661616231656231356463663832316235626632613938353032 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit: BPF prog-id=76 op=LOAD May 15 00:57:12.097000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031ca38 items=0 ppid=1519 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:12.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633661616231656231356463663832316235626632613938353032 May 15 00:57:12.097000 audit: BPF prog-id=76 op=UNLOAD May 15 00:57:12.097000 audit: BPF prog-id=75 op=UNLOAD May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:12.097000 audit: BPF prog-id=77 op=LOAD May 15 00:57:12.097000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031cac8 items=0 ppid=1519 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:12.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633661616231656231356463663832316235626632613938353032 May 15 00:57:12.108104 env[1195]: time="2025-05-15T00:57:12.108062805Z" level=info msg="StartContainer for \"b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d\" returns successfully" May 15 00:57:12.150188 systemd[1]: cri-containerd-b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d.scope: Deactivated successfully. May 15 00:57:12.155000 audit: BPF prog-id=77 op=UNLOAD May 15 00:57:12.174423 env[1195]: time="2025-05-15T00:57:12.174367100Z" level=info msg="shim disconnected" id=b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d May 15 00:57:12.174423 env[1195]: time="2025-05-15T00:57:12.174421853Z" level=warning msg="cleaning up after shim disconnected" id=b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d namespace=k8s.io May 15 00:57:12.174582 env[1195]: time="2025-05-15T00:57:12.174430739Z" level=info msg="cleaning up dead shim" May 15 00:57:12.181345 env[1195]: time="2025-05-15T00:57:12.181324996Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2139 runtime=io.containerd.runc.v2\n" May 15 00:57:12.423060 kubelet[1438]: E0515 00:57:12.422988 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:12.943390 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d-rootfs.mount: Deactivated successfully. May 15 00:57:13.058632 kubelet[1438]: I0515 00:57:13.058596 1438 scope.go:117] "RemoveContainer" containerID="e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3" May 15 00:57:13.058839 kubelet[1438]: I0515 00:57:13.058820 1438 scope.go:117] "RemoveContainer" containerID="b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d" May 15 00:57:13.058900 kubelet[1438]: E0515 00:57:13.058878 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:13.058972 kubelet[1438]: E0515 00:57:13.058950 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ck4fn_calico-system(dc06f948-88dd-4ede-bb5a-1ef2a940934e)\"" pod="calico-system/calico-node-ck4fn" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" May 15 00:57:13.060004 env[1195]: time="2025-05-15T00:57:13.059966744Z" level=info msg="RemoveContainer for \"e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3\"" May 15 00:57:13.063135 env[1195]: time="2025-05-15T00:57:13.063105584Z" level=info msg="RemoveContainer for \"e9d1c52ada678474142ce41ba6f91274d7b23887d860ea866ea5353f773935f3\" returns successfully" May 15 00:57:13.423404 kubelet[1438]: E0515 00:57:13.423327 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:14.061807 kubelet[1438]: I0515 00:57:14.061768 1438 scope.go:117] "RemoveContainer" containerID="b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d" May 15 00:57:14.062002 kubelet[1438]: E0515 00:57:14.061838 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:14.062002 kubelet[1438]: E0515 00:57:14.061910 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ck4fn_calico-system(dc06f948-88dd-4ede-bb5a-1ef2a940934e)\"" pod="calico-system/calico-node-ck4fn" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" May 15 00:57:14.424373 kubelet[1438]: E0515 00:57:14.424211 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:15.425086 kubelet[1438]: E0515 00:57:15.425025 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:16.426233 kubelet[1438]: E0515 00:57:16.426174 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:17.426870 kubelet[1438]: E0515 00:57:17.426825 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:18.427352 kubelet[1438]: E0515 00:57:18.427297 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:19.428418 kubelet[1438]: E0515 00:57:19.428351 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:20.429114 kubelet[1438]: E0515 00:57:20.429056 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:21.015592 env[1195]: time="2025-05-15T00:57:21.015528118Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:21.038553 env[1195]: time="2025-05-15T00:57:21.038491127Z" level=error msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" failed" error="failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:21.038780 kubelet[1438]: E0515 00:57:21.038726 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:21.038870 kubelet[1438]: E0515 00:57:21.038798 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326"} May 15 00:57:21.038870 kubelet[1438]: E0515 00:57:21.038836 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:21.038870 kubelet[1438]: E0515 00:57:21.038861 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:21.429719 kubelet[1438]: E0515 00:57:21.429658 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:21.757998 kubelet[1438]: I0515 00:57:21.757881 1438 scope.go:117] "RemoveContainer" containerID="b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d" May 15 00:57:21.757998 kubelet[1438]: E0515 00:57:21.757958 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:21.758158 kubelet[1438]: E0515 00:57:21.758037 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ck4fn_calico-system(dc06f948-88dd-4ede-bb5a-1ef2a940934e)\"" pod="calico-system/calico-node-ck4fn" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" May 15 00:57:22.430358 kubelet[1438]: E0515 00:57:22.430290 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:23.430495 kubelet[1438]: E0515 00:57:23.430438 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:24.017476 env[1195]: time="2025-05-15T00:57:24.017422169Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:24.038412 env[1195]: time="2025-05-15T00:57:24.038353731Z" level=error msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" failed" error="failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:24.038658 kubelet[1438]: E0515 00:57:24.038614 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:24.038720 kubelet[1438]: E0515 00:57:24.038667 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd"} May 15 00:57:24.038720 kubelet[1438]: E0515 00:57:24.038712 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:24.038846 kubelet[1438]: E0515 00:57:24.038740 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-l6cwl" podUID="ce95b523-0ce5-4400-93e0-2fd7f181d579" May 15 00:57:24.431153 kubelet[1438]: E0515 00:57:24.431109 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:25.432122 kubelet[1438]: E0515 00:57:25.432082 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:26.432913 kubelet[1438]: E0515 00:57:26.432851 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:27.433052 kubelet[1438]: E0515 00:57:27.432989 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:28.434170 kubelet[1438]: E0515 00:57:28.434121 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:29.435365 kubelet[1438]: E0515 00:57:29.435300 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:30.166537 update_engine[1186]: I0515 00:57:30.166483 1186 update_attempter.cc:509] Updating boot flags... May 15 00:57:30.435891 kubelet[1438]: E0515 00:57:30.435751 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:31.408553 kubelet[1438]: E0515 00:57:31.408476 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:31.436996 kubelet[1438]: E0515 00:57:31.436940 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:32.437547 kubelet[1438]: E0515 00:57:32.437502 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:33.015268 kubelet[1438]: I0515 00:57:33.015239 1438 scope.go:117] "RemoveContainer" containerID="b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d" May 15 00:57:33.015422 kubelet[1438]: E0515 00:57:33.015301 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:33.015678 env[1195]: time="2025-05-15T00:57:33.015588936Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:33.016859 env[1195]: time="2025-05-15T00:57:33.016828607Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 00:57:33.030353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3648812395.mount: Deactivated successfully. May 15 00:57:33.037181 env[1195]: time="2025-05-15T00:57:33.037122842Z" level=info msg="CreateContainer within sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\"" May 15 00:57:33.037780 env[1195]: time="2025-05-15T00:57:33.037729788Z" level=info msg="StartContainer for \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\"" May 15 00:57:33.039894 env[1195]: time="2025-05-15T00:57:33.039844180Z" level=error msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" failed" error="failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:33.040023 kubelet[1438]: E0515 00:57:33.039988 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:33.040082 kubelet[1438]: E0515 00:57:33.040033 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326"} May 15 00:57:33.040082 kubelet[1438]: E0515 00:57:33.040070 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:33.040172 kubelet[1438]: E0515 00:57:33.040096 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1cf798ca-ca8a-443d-a705-3bc918c4cdd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x764r" podUID="1cf798ca-ca8a-443d-a705-3bc918c4cdd6" May 15 00:57:33.053948 systemd[1]: Started cri-containerd-1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c.scope. May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.066528 kernel: kauditd_printk_skb: 78 callbacks suppressed May 15 00:57:33.066595 kernel: audit: type=1400 audit(1747270653.064:529): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019d6b0 a2=3c a3=7fa528349848 items=0 ppid=1519 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:33.074294 kernel: audit: type=1300 audit(1747270653.064:529): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019d6b0 a2=3c a3=7fa528349848 items=0 ppid=1519 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:33.074366 kernel: audit: type=1327 audit(1747270653.064:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643263303163373637303938383366333161623530623061393736 May 15 00:57:33.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643263303163373637303938383366333161623530623061393736 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.081330 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.081371 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.087191 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.087286 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.090110 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.093454 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.093739 env[1195]: time="2025-05-15T00:57:33.093694443Z" level=info msg="StartContainer for \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\" returns successfully" May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.099960 kernel: audit: type=1400 audit(1747270653.064:530): avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.064000 audit: BPF prog-id=78 op=LOAD May 15 00:57:33.064000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019d9d8 a2=78 a3=c000302438 items=0 ppid=1519 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:33.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643263303163373637303938383366333161623530623061393736 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.068000 audit: BPF prog-id=79 op=LOAD May 15 00:57:33.068000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019d770 a2=78 a3=c000302488 items=0 ppid=1519 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:33.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643263303163373637303938383366333161623530623061393736 May 15 00:57:33.073000 audit: BPF prog-id=79 op=UNLOAD May 15 00:57:33.073000 audit: BPF prog-id=78 op=UNLOAD May 15 00:57:33.073000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:33.073000 audit: BPF prog-id=80 op=LOAD May 15 00:57:33.073000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019dc30 a2=78 a3=c000302518 items=0 ppid=1519 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:33.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643263303163373637303938383366333161623530623061393736 May 15 00:57:33.135739 systemd[1]: cri-containerd-1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c.scope: Deactivated successfully. May 15 00:57:33.140000 audit: BPF prog-id=80 op=UNLOAD May 15 00:57:33.308612 env[1195]: time="2025-05-15T00:57:33.308550065Z" level=info msg="shim disconnected" id=1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c May 15 00:57:33.308612 env[1195]: time="2025-05-15T00:57:33.308592985Z" level=warning msg="cleaning up after shim disconnected" id=1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c namespace=k8s.io May 15 00:57:33.308612 env[1195]: time="2025-05-15T00:57:33.308602463Z" level=info msg="cleaning up dead shim" May 15 00:57:33.314381 env[1195]: time="2025-05-15T00:57:33.314338413Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2293 runtime=io.containerd.runc.v2\n" May 15 00:57:33.437938 kubelet[1438]: E0515 00:57:33.437906 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:34.027298 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c-rootfs.mount: Deactivated successfully. May 15 00:57:34.090621 kubelet[1438]: I0515 00:57:34.090579 1438 scope.go:117] "RemoveContainer" containerID="b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d" May 15 00:57:34.090921 kubelet[1438]: I0515 00:57:34.090896 1438 scope.go:117] "RemoveContainer" containerID="1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c" May 15 00:57:34.090981 kubelet[1438]: E0515 00:57:34.090969 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:34.091085 kubelet[1438]: E0515 00:57:34.091061 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-ck4fn_calico-system(dc06f948-88dd-4ede-bb5a-1ef2a940934e)\"" pod="calico-system/calico-node-ck4fn" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" May 15 00:57:34.091498 env[1195]: time="2025-05-15T00:57:34.091452027Z" level=info msg="RemoveContainer for \"b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d\"" May 15 00:57:34.096324 env[1195]: time="2025-05-15T00:57:34.096283927Z" level=info msg="RemoveContainer for \"b1c6aab1eb15dcf821b5bf2a98502bd040cee556df71ee2965c657a7ccc44a1d\" returns successfully" May 15 00:57:34.439175 kubelet[1438]: E0515 00:57:34.439030 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:35.440180 kubelet[1438]: E0515 00:57:35.440122 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:36.440840 kubelet[1438]: E0515 00:57:36.440794 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:37.015904 env[1195]: time="2025-05-15T00:57:37.015837250Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:37.036703 env[1195]: time="2025-05-15T00:57:37.036646073Z" level=error msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" failed" error="failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:37.036870 kubelet[1438]: E0515 00:57:37.036836 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:37.036919 kubelet[1438]: E0515 00:57:37.036882 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd"} May 15 00:57:37.036946 kubelet[1438]: E0515 00:57:37.036916 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:37.036946 kubelet[1438]: E0515 00:57:37.036937 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ce95b523-0ce5-4400-93e0-2fd7f181d579\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-l6cwl" podUID="ce95b523-0ce5-4400-93e0-2fd7f181d579" May 15 00:57:37.441668 kubelet[1438]: E0515 00:57:37.441604 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:38.442109 kubelet[1438]: E0515 00:57:38.442048 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:39.443036 kubelet[1438]: E0515 00:57:39.442978 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:40.443287 kubelet[1438]: E0515 00:57:40.443237 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:40.775012 env[1195]: time="2025-05-15T00:57:40.774962314Z" level=info msg="StopPodSandbox for \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\"" May 15 00:57:40.775461 env[1195]: time="2025-05-15T00:57:40.775039549Z" level=info msg="Container to stop \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.775461 env[1195]: time="2025-05-15T00:57:40.775056331Z" level=info msg="Container to stop \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.775461 env[1195]: time="2025-05-15T00:57:40.775069175Z" level=info msg="Container to stop \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.777189 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262-shm.mount: Deactivated successfully. May 15 00:57:40.780000 audit: BPF prog-id=55 op=UNLOAD May 15 00:57:40.782099 systemd[1]: cri-containerd-369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262.scope: Deactivated successfully. May 15 00:57:40.784998 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 00:57:40.785178 kernel: audit: type=1334 audit(1747270660.780:536): prog-id=55 op=UNLOAD May 15 00:57:40.787000 audit: BPF prog-id=58 op=UNLOAD May 15 00:57:40.790814 kernel: audit: type=1334 audit(1747270660.787:537): prog-id=58 op=UNLOAD May 15 00:57:40.799682 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262-rootfs.mount: Deactivated successfully. May 15 00:57:40.808551 env[1195]: time="2025-05-15T00:57:40.808481448Z" level=info msg="shim disconnected" id=369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262 May 15 00:57:40.808551 env[1195]: time="2025-05-15T00:57:40.808542073Z" level=warning msg="cleaning up after shim disconnected" id=369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262 namespace=k8s.io May 15 00:57:40.808551 env[1195]: time="2025-05-15T00:57:40.808555608Z" level=info msg="cleaning up dead shim" May 15 00:57:40.815468 env[1195]: time="2025-05-15T00:57:40.815404751Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2346 runtime=io.containerd.runc.v2\n" May 15 00:57:40.815716 env[1195]: time="2025-05-15T00:57:40.815688926Z" level=info msg="TearDown network for sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" successfully" May 15 00:57:40.815716 env[1195]: time="2025-05-15T00:57:40.815710607Z" level=info msg="StopPodSandbox for \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" returns successfully" May 15 00:57:40.845436 kubelet[1438]: I0515 00:57:40.845376 1438 memory_manager.go:355] "RemoveStaleState removing state" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" containerName="calico-node" May 15 00:57:40.845436 kubelet[1438]: I0515 00:57:40.845401 1438 memory_manager.go:355] "RemoveStaleState removing state" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" containerName="calico-node" May 15 00:57:40.845436 kubelet[1438]: I0515 00:57:40.845406 1438 memory_manager.go:355] "RemoveStaleState removing state" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" containerName="calico-node" May 15 00:57:40.850445 systemd[1]: Created slice kubepods-besteffort-pod04aa442e_e5b7_4aef_9806_a7323552bc74.slice. May 15 00:57:40.916539 kubelet[1438]: I0515 00:57:40.916485 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-run-calico\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916539 kubelet[1438]: I0515 00:57:40.916531 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-lib-modules\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916570 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dc06f948-88dd-4ede-bb5a-1ef2a940934e-node-certs\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916588 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-bin-dir\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916604 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-policysync\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916618 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-net-dir\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916633 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-lib-calico\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916762 kubelet[1438]: I0515 00:57:40.916634 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916656 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-bxwkv\" (UniqueName: \"kubernetes.io/projected/dc06f948-88dd-4ede-bb5a-1ef2a940934e-kube-api-access-bxwkv\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916731 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-flexvol-driver-host\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916753 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-xtables-lock\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916766 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-log-dir\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916809 1438 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc06f948-88dd-4ede-bb5a-1ef2a940934e-tigera-ca-bundle\") pod \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\" (UID: \"dc06f948-88dd-4ede-bb5a-1ef2a940934e\") " May 15 00:57:40.916993 kubelet[1438]: I0515 00:57:40.916848 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-var-run-calico\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917192 kubelet[1438]: I0515 00:57:40.916853 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.917192 kubelet[1438]: I0515 00:57:40.916866 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-cni-log-dir\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917192 kubelet[1438]: I0515 00:57:40.916890 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.917192 kubelet[1438]: I0515 00:57:40.916908 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.917192 kubelet[1438]: I0515 00:57:40.916922 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.917355 kubelet[1438]: I0515 00:57:40.916922 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m224v\" (UniqueName: \"kubernetes.io/projected/04aa442e-e5b7-4aef-9806-a7323552bc74-kube-api-access-m224v\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917355 kubelet[1438]: I0515 00:57:40.916945 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-xtables-lock\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917355 kubelet[1438]: I0515 00:57:40.916959 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-cni-bin-dir\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917355 kubelet[1438]: I0515 00:57:40.916975 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-var-lib-calico\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917355 kubelet[1438]: I0515 00:57:40.916989 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-flexvol-driver-host\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917006 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-policysync\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917019 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04aa442e-e5b7-4aef-9806-a7323552bc74-node-certs\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917037 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-lib-modules\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917052 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04aa442e-e5b7-4aef-9806-a7323552bc74-cni-net-dir\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917066 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04aa442e-e5b7-4aef-9806-a7323552bc74-tigera-ca-bundle\") pod \"calico-node-k9b9q\" (UID: \"04aa442e-e5b7-4aef-9806-a7323552bc74\") " pod="calico-system/calico-node-k9b9q" May 15 00:57:40.917568 kubelet[1438]: I0515 00:57:40.917085 1438 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-flexvol-driver-host\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:40.917827 kubelet[1438]: I0515 00:57:40.917094 1438 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-xtables-lock\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:40.917827 kubelet[1438]: I0515 00:57:40.917102 1438 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-log-dir\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:40.917827 kubelet[1438]: I0515 00:57:40.917109 1438 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-run-calico\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:40.917827 kubelet[1438]: I0515 00:57:40.917116 1438 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-bin-dir\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:40.917827 kubelet[1438]: I0515 00:57:40.917159 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.918224 kubelet[1438]: I0515 00:57:40.918053 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.918224 kubelet[1438]: I0515 00:57:40.918084 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-policysync" (OuterVolumeSpecName: "policysync") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.918224 kubelet[1438]: I0515 00:57:40.918136 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.919559 kubelet[1438]: I0515 00:57:40.919503 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/dc06f948-88dd-4ede-bb5a-1ef2a940934e-node-certs" (OuterVolumeSpecName: "node-certs") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 15 00:57:40.920624 systemd[1]: var-lib-kubelet-pods-dc06f948\x2d88dd\x2d4ede\x2dbb5a\x2d1ef2a940934e-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 00:57:40.920740 systemd[1]: var-lib-kubelet-pods-dc06f948\x2d88dd\x2d4ede\x2dbb5a\x2d1ef2a940934e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dbxwkv.mount: Deactivated successfully. May 15 00:57:40.920832 systemd[1]: var-lib-kubelet-pods-dc06f948\x2d88dd\x2d4ede\x2dbb5a\x2d1ef2a940934e-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 00:57:40.923769 kubelet[1438]: I0515 00:57:40.923722 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/dc06f948-88dd-4ede-bb5a-1ef2a940934e-kube-api-access-bxwkv" (OuterVolumeSpecName: "kube-api-access-bxwkv") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "kube-api-access-bxwkv". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 00:57:40.924300 kubelet[1438]: I0515 00:57:40.924250 1438 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/dc06f948-88dd-4ede-bb5a-1ef2a940934e-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "dc06f948-88dd-4ede-bb5a-1ef2a940934e" (UID: "dc06f948-88dd-4ede-bb5a-1ef2a940934e"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 15 00:57:41.017605 kubelet[1438]: I0515 00:57:41.017565 1438 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-bxwkv\" (UniqueName: \"kubernetes.io/projected/dc06f948-88dd-4ede-bb5a-1ef2a940934e-kube-api-access-bxwkv\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017924 kubelet[1438]: I0515 00:57:41.017883 1438 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc06f948-88dd-4ede-bb5a-1ef2a940934e-tigera-ca-bundle\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017985 kubelet[1438]: I0515 00:57:41.017918 1438 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-lib-modules\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017985 kubelet[1438]: I0515 00:57:41.017961 1438 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dc06f948-88dd-4ede-bb5a-1ef2a940934e-node-certs\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017985 kubelet[1438]: I0515 00:57:41.017973 1438 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-policysync\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017985 kubelet[1438]: I0515 00:57:41.017981 1438 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-var-lib-calico\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.017985 kubelet[1438]: I0515 00:57:41.017991 1438 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dc06f948-88dd-4ede-bb5a-1ef2a940934e-cni-net-dir\") on node \"10.0.0.130\" DevicePath \"\"" May 15 00:57:41.105111 kubelet[1438]: I0515 00:57:41.105020 1438 scope.go:117] "RemoveContainer" containerID="1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c" May 15 00:57:41.107778 env[1195]: time="2025-05-15T00:57:41.107749693Z" level=info msg="RemoveContainer for \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\"" May 15 00:57:41.109073 systemd[1]: Removed slice kubepods-besteffort-poddc06f948_88dd_4ede_bb5a_1ef2a940934e.slice. May 15 00:57:41.153092 kubelet[1438]: E0515 00:57:41.153055 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:41.153506 env[1195]: time="2025-05-15T00:57:41.153470872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k9b9q,Uid:04aa442e-e5b7-4aef-9806-a7323552bc74,Namespace:calico-system,Attempt:0,}" May 15 00:57:41.218665 env[1195]: time="2025-05-15T00:57:41.218607429Z" level=info msg="RemoveContainer for \"1ad2c01c76709883f31ab50b0a9769b4e395674fd388f5ef41b166eca5d8339c\" returns successfully" May 15 00:57:41.218852 kubelet[1438]: I0515 00:57:41.218810 1438 scope.go:117] "RemoveContainer" containerID="e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7" May 15 00:57:41.219935 env[1195]: time="2025-05-15T00:57:41.219892880Z" level=info msg="RemoveContainer for \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\"" May 15 00:57:41.306233 env[1195]: time="2025-05-15T00:57:41.306177426Z" level=info msg="RemoveContainer for \"e929c4512f06134f6e6646e3b8b2c226ff3409862fc3ccd1742d92e0ed6994f7\" returns successfully" May 15 00:57:41.306492 kubelet[1438]: I0515 00:57:41.306452 1438 scope.go:117] "RemoveContainer" containerID="a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9" May 15 00:57:41.307549 env[1195]: time="2025-05-15T00:57:41.307527959Z" level=info msg="RemoveContainer for \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\"" May 15 00:57:41.335882 env[1195]: time="2025-05-15T00:57:41.335815886Z" level=info msg="RemoveContainer for \"a1449167fbedfdca13555e8c0efc1113f9055d416c90c71eda7e4e2f4505b8a9\" returns successfully" May 15 00:57:41.347037 env[1195]: time="2025-05-15T00:57:41.346948443Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:41.347037 env[1195]: time="2025-05-15T00:57:41.346994961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:41.347037 env[1195]: time="2025-05-15T00:57:41.347007114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:41.347417 env[1195]: time="2025-05-15T00:57:41.347361661Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602 pid=2372 runtime=io.containerd.runc.v2 May 15 00:57:41.356820 systemd[1]: Started cri-containerd-60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602.scope. May 15 00:57:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.373471 kernel: audit: type=1400 audit(1747270661.364:538): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.373606 kernel: audit: type=1400 audit(1747270661.364:539): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.373626 kernel: audit: type=1400 audit(1747270661.364:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.376776 kernel: audit: type=1400 audit(1747270661.364:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.383686 kernel: audit: type=1400 audit(1747270661.364:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.383732 kernel: audit: type=1400 audit(1747270661.364:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.390597 kernel: audit: type=1400 audit(1747270661.364:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.390678 kernel: audit: type=1400 audit(1747270661.364:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit: BPF prog-id=81 op=LOAD May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2372 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643035383061666438633162393035626361633662656636366136 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2372 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643035383061666438633162393035626361633662656636366136 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.368000 audit: BPF prog-id=82 op=LOAD May 15 00:57:41.368000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034a7f0 items=0 ppid=2372 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643035383061666438633162393035626361633662656636366136 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.371000 audit: BPF prog-id=83 op=LOAD May 15 00:57:41.371000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034a838 items=0 ppid=2372 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643035383061666438633162393035626361633662656636366136 May 15 00:57:41.374000 audit: BPF prog-id=83 op=UNLOAD May 15 00:57:41.375000 audit: BPF prog-id=82 op=UNLOAD May 15 00:57:41.375000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.375000 audit: BPF prog-id=84 op=LOAD May 15 00:57:41.375000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034ac48 items=0 ppid=2372 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643035383061666438633162393035626361633662656636366136 May 15 00:57:41.404867 env[1195]: time="2025-05-15T00:57:41.404821980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k9b9q,Uid:04aa442e-e5b7-4aef-9806-a7323552bc74,Namespace:calico-system,Attempt:0,} returns sandbox id \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\"" May 15 00:57:41.405603 kubelet[1438]: E0515 00:57:41.405569 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:41.407074 env[1195]: time="2025-05-15T00:57:41.407052370Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:57:41.444403 kubelet[1438]: E0515 00:57:41.444364 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:41.466187 env[1195]: time="2025-05-15T00:57:41.466118544Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d\"" May 15 00:57:41.466661 env[1195]: time="2025-05-15T00:57:41.466616923Z" level=info msg="StartContainer for \"1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d\"" May 15 00:57:41.479738 systemd[1]: Started cri-containerd-1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d.scope. May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc751fd1568 items=0 ppid=2372 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393434313534346131303266613331303239613938386666313962 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit: BPF prog-id=85 op=LOAD May 15 00:57:41.490000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000297058 items=0 ppid=2372 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393434313534346131303266613331303239613938386666313962 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit: BPF prog-id=86 op=LOAD May 15 00:57:41.490000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002970a8 items=0 ppid=2372 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393434313534346131303266613331303239613938386666313962 May 15 00:57:41.490000 audit: BPF prog-id=86 op=UNLOAD May 15 00:57:41.490000 audit: BPF prog-id=85 op=UNLOAD May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.490000 audit: BPF prog-id=87 op=LOAD May 15 00:57:41.490000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000297138 items=0 ppid=2372 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393434313534346131303266613331303239613938386666313962 May 15 00:57:41.504979 env[1195]: time="2025-05-15T00:57:41.504928378Z" level=info msg="StartContainer for \"1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d\" returns successfully" May 15 00:57:41.513544 systemd[1]: cri-containerd-1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d.scope: Deactivated successfully. May 15 00:57:41.518000 audit: BPF prog-id=87 op=UNLOAD May 15 00:57:41.577560 env[1195]: time="2025-05-15T00:57:41.577497764Z" level=info msg="shim disconnected" id=1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d May 15 00:57:41.577560 env[1195]: time="2025-05-15T00:57:41.577541396Z" level=warning msg="cleaning up after shim disconnected" id=1b9441544a102fa31029a988ff19b2eff121a5cf504d2507eea417dd8c921e7d namespace=k8s.io May 15 00:57:41.577560 env[1195]: time="2025-05-15T00:57:41.577549892Z" level=info msg="cleaning up dead shim" May 15 00:57:41.583443 env[1195]: time="2025-05-15T00:57:41.583390120Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2449 runtime=io.containerd.runc.v2\n" May 15 00:57:42.016065 kubelet[1438]: I0515 00:57:42.016029 1438 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="dc06f948-88dd-4ede-bb5a-1ef2a940934e" path="/var/lib/kubelet/pods/dc06f948-88dd-4ede-bb5a-1ef2a940934e/volumes" May 15 00:57:42.108601 kubelet[1438]: E0515 00:57:42.108570 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:42.110296 env[1195]: time="2025-05-15T00:57:42.110247144Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:57:42.123656 env[1195]: time="2025-05-15T00:57:42.123619102Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f\"" May 15 00:57:42.124239 env[1195]: time="2025-05-15T00:57:42.124205366Z" level=info msg="StartContainer for \"7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f\"" May 15 00:57:42.139847 systemd[1]: Started cri-containerd-7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f.scope. May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f3a88630cc8 items=0 ppid=2372 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336236313066643235356265326338663435663762653562613963 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit: BPF prog-id=88 op=LOAD May 15 00:57:42.153000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000305268 items=0 ppid=2372 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336236313066643235356265326338663435663762653562613963 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.153000 audit: BPF prog-id=89 op=LOAD May 15 00:57:42.153000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003052b8 items=0 ppid=2372 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336236313066643235356265326338663435663762653562613963 May 15 00:57:42.154000 audit: BPF prog-id=89 op=UNLOAD May 15 00:57:42.154000 audit: BPF prog-id=88 op=UNLOAD May 15 00:57:42.154000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.154000 audit: BPF prog-id=90 op=LOAD May 15 00:57:42.154000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000305348 items=0 ppid=2372 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336236313066643235356265326338663435663762653562613963 May 15 00:57:42.169180 env[1195]: time="2025-05-15T00:57:42.169119828Z" level=info msg="StartContainer for \"7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f\" returns successfully" May 15 00:57:42.395307 systemd[1]: cri-containerd-7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f.scope: Deactivated successfully. May 15 00:57:42.398000 audit: BPF prog-id=90 op=UNLOAD May 15 00:57:42.415645 env[1195]: time="2025-05-15T00:57:42.415582983Z" level=info msg="shim disconnected" id=7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f May 15 00:57:42.415645 env[1195]: time="2025-05-15T00:57:42.415638066Z" level=warning msg="cleaning up after shim disconnected" id=7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f namespace=k8s.io May 15 00:57:42.415645 env[1195]: time="2025-05-15T00:57:42.415647113Z" level=info msg="cleaning up dead shim" May 15 00:57:42.422653 env[1195]: time="2025-05-15T00:57:42.422596909Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2515 runtime=io.containerd.runc.v2\n" May 15 00:57:42.444693 kubelet[1438]: E0515 00:57:42.444629 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:42.776960 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7d3b610fd255be2c8f45f7be5ba9ca2d95c8500f59832e685cfc63a1b6c89f3f-rootfs.mount: Deactivated successfully. May 15 00:57:43.112414 kubelet[1438]: E0515 00:57:43.112289 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:43.121227 env[1195]: time="2025-05-15T00:57:43.121179258Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:57:43.197230 env[1195]: time="2025-05-15T00:57:43.197164964Z" level=info msg="CreateContainer within sandbox \"60d0580afd8c1b905bcac6bef66a61bfce948a28277e5e3908fa573c4c569602\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2cf6f7e6509b0850e8b53c41821a793fbc651ffd25fc670c897b94adb1e1582a\"" May 15 00:57:43.197726 env[1195]: time="2025-05-15T00:57:43.197690193Z" level=info msg="StartContainer for \"2cf6f7e6509b0850e8b53c41821a793fbc651ffd25fc670c897b94adb1e1582a\"" May 15 00:57:43.211727 systemd[1]: Started cri-containerd-2cf6f7e6509b0850e8b53c41821a793fbc651ffd25fc670c897b94adb1e1582a.scope. May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdf58c428e8 items=0 ppid=2372 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263663666376536353039623038353065386235336334313832316137 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit: BPF prog-id=91 op=LOAD May 15 00:57:43.222000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bbd8 items=0 ppid=2372 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263663666376536353039623038353065386235336334313832316137 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit: BPF prog-id=92 op=LOAD May 15 00:57:43.222000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bc28 items=0 ppid=2372 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263663666376536353039623038353065386235336334313832316137 May 15 00:57:43.222000 audit: BPF prog-id=92 op=UNLOAD May 15 00:57:43.222000 audit: BPF prog-id=91 op=UNLOAD May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:43.222000 audit: BPF prog-id=93 op=LOAD May 15 00:57:43.222000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032bcb8 items=0 ppid=2372 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263663666376536353039623038353065386235336334313832316137 May 15 00:57:43.234911 env[1195]: time="2025-05-15T00:57:43.234858413Z" level=info msg="StartContainer for \"2cf6f7e6509b0850e8b53c41821a793fbc651ffd25fc670c897b94adb1e1582a\" returns successfully" May 15 00:57:43.444979 kubelet[1438]: E0515 00:57:43.444815 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:44.115868 kubelet[1438]: E0515 00:57:44.115760 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:44.446000 audit[2667]: AVC avc: denied { write } for pid=2667 comm="tee" name="fd" dev="proc" ino=20177 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.536953 kubelet[1438]: E0515 00:57:44.519312 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:44.447000 audit[2665]: AVC avc: denied { write } for pid=2665 comm="tee" name="fd" dev="proc" ino=21909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.447000 audit[2665]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe53dfca29 a2=241 a3=1b6 items=1 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.447000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 00:57:44.447000 audit: PATH item=0 name="/dev/fd/63" inode=21906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.447000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.447000 audit[2674]: AVC avc: denied { write } for pid=2674 comm="tee" name="fd" dev="proc" ino=20899 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.447000 audit[2674]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d85ea29 a2=241 a3=1b6 items=1 ppid=2622 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.447000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 00:57:44.447000 audit: PATH item=0 name="/dev/fd/63" inode=20896 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.447000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.446000 audit[2667]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0c204a1a a2=241 a3=1b6 items=1 ppid=2620 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.446000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 00:57:44.446000 audit: PATH item=0 name="/dev/fd/63" inode=20169 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.536000 audit[2687]: AVC avc: denied { write } for pid=2687 comm="tee" name="fd" dev="proc" ino=22697 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.536000 audit[2687]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffede7b0a2a a2=241 a3=1b6 items=1 ppid=2628 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.536000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 00:57:44.536000 audit: PATH item=0 name="/dev/fd/63" inode=22690 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.536000 audit[2685]: AVC avc: denied { write } for pid=2685 comm="tee" name="fd" dev="proc" ino=21913 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.536000 audit[2685]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe71505a2b a2=241 a3=1b6 items=1 ppid=2621 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.536000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 00:57:44.536000 audit: PATH item=0 name="/dev/fd/63" inode=22687 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.538000 audit[2669]: AVC avc: denied { write } for pid=2669 comm="tee" name="fd" dev="proc" ino=22701 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.538000 audit[2669]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3563ea19 a2=241 a3=1b6 items=1 ppid=2631 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 00:57:44.538000 audit: PATH item=0 name="/dev/fd/63" inode=20172 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.538000 audit[2689]: AVC avc: denied { write } for pid=2689 comm="tee" name="fd" dev="proc" ino=21917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.538000 audit[2689]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff37c39a29 a2=241 a3=1b6 items=1 ppid=2637 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 00:57:44.538000 audit: PATH item=0 name="/dev/fd/63" inode=22693 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit: BPF prog-id=94 op=LOAD May 15 00:57:44.619000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd03f06a10 a2=98 a3=3 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.619000 audit: BPF prog-id=94 op=UNLOAD May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit: BPF prog-id=95 op=LOAD May 15 00:57:44.619000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03f067f0 a2=74 a3=540051 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.619000 audit: BPF prog-id=95 op=UNLOAD May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.619000 audit: BPF prog-id=96 op=LOAD May 15 00:57:44.619000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03f06820 a2=94 a3=2 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.619000 audit: BPF prog-id=96 op=UNLOAD May 15 00:57:44.732000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.732000 audit: BPF prog-id=97 op=LOAD May 15 00:57:44.732000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03f066e0 a2=40 a3=1 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.732000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.733000 audit: BPF prog-id=97 op=UNLOAD May 15 00:57:44.733000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.733000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd03f067b0 a2=50 a3=7ffd03f06890 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f066f0 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03f06720 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03f06630 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f06740 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f06720 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f06710 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f06740 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03f06720 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03f06740 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03f06710 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03f06780 a2=28 a3=0 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd03f06530 a2=50 a3=1 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit: BPF prog-id=98 op=LOAD May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd03f06530 a2=94 a3=5 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit: BPF prog-id=98 op=UNLOAD May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd03f065e0 a2=50 a3=1 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd03f06700 a2=4 a3=38 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.740000 audit[2732]: AVC avc: denied { confidentiality } for pid=2732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.740000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03f06750 a2=94 a3=6 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { confidentiality } for pid=2732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.741000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03f05f00 a2=94 a3=83 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.741000 audit[2732]: AVC avc: denied { confidentiality } for pid=2732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.741000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03f05f00 a2=94 a3=83 items=0 ppid=2638 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit: BPF prog-id=99 op=LOAD May 15 00:57:44.747000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebd19dc50 a2=98 a3=1999999999999999 items=0 ppid=2638 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.747000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.747000 audit: BPF prog-id=99 op=UNLOAD May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit: BPF prog-id=100 op=LOAD May 15 00:57:44.747000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebd19db30 a2=74 a3=ffff items=0 ppid=2638 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.747000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.747000 audit: BPF prog-id=100 op=UNLOAD May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.747000 audit: BPF prog-id=101 op=LOAD May 15 00:57:44.747000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebd19db70 a2=40 a3=7ffebd19dd50 items=0 ppid=2638 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.747000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.747000 audit: BPF prog-id=101 op=UNLOAD May 15 00:57:44.790077 systemd-networkd[1017]: vxlan.calico: Link UP May 15 00:57:44.790085 systemd-networkd[1017]: vxlan.calico: Gained carrier May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit: BPF prog-id=102 op=LOAD May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec1cd6680 a2=98 a3=ffffffff items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit: BPF prog-id=102 op=UNLOAD May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit: BPF prog-id=103 op=LOAD May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec1cd6490 a2=74 a3=540051 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit: BPF prog-id=103 op=UNLOAD May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit: BPF prog-id=104 op=LOAD May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec1cd64c0 a2=94 a3=2 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit: BPF prog-id=104 op=UNLOAD May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd6390 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1cd63c0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1cd62d0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd63e0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd63c0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd63b0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd63e0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1cd63c0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1cd63e0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1cd63b0 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec1cd6420 a2=28 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.807000 audit: BPF prog-id=105 op=LOAD May 15 00:57:44.807000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec1cd6290 a2=40 a3=0 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.807000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.807000 audit: BPF prog-id=105 op=UNLOAD May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffec1cd6280 a2=50 a3=2800 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffec1cd6280 a2=50 a3=2800 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit: BPF prog-id=106 op=LOAD May 15 00:57:44.808000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec1cd5aa0 a2=94 a3=2 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.808000 audit: BPF prog-id=106 op=UNLOAD May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.808000 audit: BPF prog-id=107 op=LOAD May 15 00:57:44.808000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec1cd5ba0 a2=94 a3=30 items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit: BPF prog-id=108 op=LOAD May 15 00:57:44.812000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2e65b440 a2=98 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.812000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.812000 audit: BPF prog-id=108 op=UNLOAD May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.812000 audit: BPF prog-id=109 op=LOAD May 15 00:57:44.812000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e65b220 a2=74 a3=540051 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.812000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.813000 audit: BPF prog-id=109 op=UNLOAD May 15 00:57:44.813000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.813000 audit: BPF prog-id=110 op=LOAD May 15 00:57:44.813000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e65b250 a2=94 a3=2 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.813000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.813000 audit: BPF prog-id=110 op=UNLOAD May 15 00:57:44.921000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.921000 audit: BPF prog-id=111 op=LOAD May 15 00:57:44.921000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e65b110 a2=40 a3=1 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.921000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.922000 audit: BPF prog-id=111 op=UNLOAD May 15 00:57:44.922000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.922000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe2e65b1e0 a2=50 a3=7ffe2e65b2c0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b120 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e65b150 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e65b060 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b170 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b150 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b140 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b170 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e65b150 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e65b170 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e65b140 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e65b1b0 a2=28 a3=0 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2e65af60 a2=50 a3=1 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit: BPF prog-id=112 op=LOAD May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2e65af60 a2=94 a3=5 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit: BPF prog-id=112 op=UNLOAD May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2e65b010 a2=50 a3=1 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe2e65b130 a2=4 a3=38 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { confidentiality } for pid=2778 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e65b180 a2=94 a3=6 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.929000 audit[2778]: AVC avc: denied { confidentiality } for pid=2778 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.929000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e65a930 a2=94 a3=83 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { confidentiality } for pid=2778 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.930000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e65a930 a2=94 a3=83 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2e65c370 a2=10 a3=208 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2e65c210 a2=10 a3=3 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2e65c1b0 a2=10 a3=3 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.930000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.930000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2e65c1b0 a2=10 a3=7 items=0 ppid=2638 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.939000 audit: BPF prog-id=107 op=UNLOAD May 15 00:57:44.974000 audit[2806]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.974000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe308344d0 a2=0 a3=7ffe308344bc items=0 ppid=2638 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.981000 audit[2809]: NETFILTER_CFG table=nat:72 family=2 entries=15 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.981000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffda4178e60 a2=0 a3=7ffda4178e4c items=0 ppid=2638 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.982000 audit[2805]: NETFILTER_CFG table=raw:73 family=2 entries=21 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.982000 audit[2805]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdb2aa6f40 a2=0 a3=7ffdb2aa6f2c items=0 ppid=2638 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.982000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.984000 audit[2807]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.984000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe870c7a30 a2=0 a3=7ffe870c7a1c items=0 ppid=2638 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.984000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:45.117293 kubelet[1438]: E0515 00:57:45.117175 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:45.520336 kubelet[1438]: E0515 00:57:45.520184 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:46.521079 kubelet[1438]: E0515 00:57:46.521011 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:46.748954 systemd-networkd[1017]: vxlan.calico: Gained IPv6LL May 15 00:57:47.521873 kubelet[1438]: E0515 00:57:47.521815 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:48.015676 env[1195]: time="2025-05-15T00:57:48.015538870Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:48.054638 kubelet[1438]: I0515 00:57:48.054573 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-k9b9q" podStartSLOduration=8.054549443 podStartE2EDuration="8.054549443s" podCreationTimestamp="2025-05-15 00:57:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:57:44.144749278 +0000 UTC m=+53.250433769" watchObservedRunningTime="2025-05-15 00:57:48.054549443 +0000 UTC m=+57.160233924" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" iface="eth0" netns="/var/run/netns/cni-a5e485aa-92ce-6c9f-4eb9-c8e5e8b857ed" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" iface="eth0" netns="/var/run/netns/cni-a5e485aa-92ce-6c9f-4eb9-c8e5e8b857ed" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" iface="eth0" netns="/var/run/netns/cni-a5e485aa-92ce-6c9f-4eb9-c8e5e8b857ed" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.054 [INFO][2858] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.076 [INFO][2867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.076 [INFO][2867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.076 [INFO][2867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.082 [WARNING][2867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.082 [INFO][2867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.083 [INFO][2867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.086299 env[1195]: 2025-05-15 00:57:48.084 [INFO][2858] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:48.086865 env[1195]: time="2025-05-15T00:57:48.086471243Z" level=info msg="TearDown network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" successfully" May 15 00:57:48.086865 env[1195]: time="2025-05-15T00:57:48.086510837Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" returns successfully" May 15 00:57:48.087901 systemd[1]: run-netns-cni\x2da5e485aa\x2d92ce\x2d6c9f\x2d4eb9\x2dc8e5e8b857ed.mount: Deactivated successfully. May 15 00:57:48.088745 env[1195]: time="2025-05-15T00:57:48.088678204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x764r,Uid:1cf798ca-ca8a-443d-a705-3bc918c4cdd6,Namespace:calico-system,Attempt:1,}" May 15 00:57:48.191721 systemd-networkd[1017]: cali476e5776d78: Link UP May 15 00:57:48.194812 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:48.194924 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali476e5776d78: link becomes ready May 15 00:57:48.195014 systemd-networkd[1017]: cali476e5776d78: Gained carrier May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.133 [INFO][2874] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.130-k8s-csi--node--driver--x764r-eth0 csi-node-driver- calico-system 1cf798ca-ca8a-443d-a705-3bc918c4cdd6 1105 0 2025-05-15 00:56:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.130 csi-node-driver-x764r eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali476e5776d78 [] []}} ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.134 [INFO][2874] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.157 [INFO][2888] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" HandleID="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.165 [INFO][2888] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" HandleID="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e3dd0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.130", "pod":"csi-node-driver-x764r", "timestamp":"2025-05-15 00:57:48.15770392 +0000 UTC"}, Hostname:"10.0.0.130", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.166 [INFO][2888] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.166 [INFO][2888] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.166 [INFO][2888] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.130' May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.168 [INFO][2888] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.171 [INFO][2888] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.175 [INFO][2888] ipam/ipam.go 489: Trying affinity for 192.168.2.64/26 host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.176 [INFO][2888] ipam/ipam.go 155: Attempting to load block cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.178 [INFO][2888] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.178 [INFO][2888] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.2.64/26 handle="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.179 [INFO][2888] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0 May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.183 [INFO][2888] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.2.64/26 handle="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.187 [INFO][2888] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.2.65/26] block=192.168.2.64/26 handle="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.187 [INFO][2888] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.2.65/26] handle="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" host="10.0.0.130" May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.187 [INFO][2888] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.205807 env[1195]: 2025-05-15 00:57:48.187 [INFO][2888] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.2.65/26] IPv6=[] ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" HandleID="k8s-pod-network.a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.189 [INFO][2874] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-csi--node--driver--x764r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1cf798ca-ca8a-443d-a705-3bc918c4cdd6", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"", Pod:"csi-node-driver-x764r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.2.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali476e5776d78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.189 [INFO][2874] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.2.65/32] ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.189 [INFO][2874] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali476e5776d78 ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.195 [INFO][2874] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.195 [INFO][2874] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-csi--node--driver--x764r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1cf798ca-ca8a-443d-a705-3bc918c4cdd6", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0", Pod:"csi-node-driver-x764r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.2.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali476e5776d78", MAC:"2a:97:1f:e8:17:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.206346 env[1195]: 2025-05-15 00:57:48.204 [INFO][2874] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0" Namespace="calico-system" Pod="csi-node-driver-x764r" WorkloadEndpoint="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:48.214853 kernel: kauditd_printk_skb: 695 callbacks suppressed May 15 00:57:48.214975 kernel: audit: type=1325 audit(1747270668.211:678): table=filter:75 family=2 entries=34 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:48.211000 audit[2913]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:48.215713 env[1195]: time="2025-05-15T00:57:48.215637745Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:48.215713 env[1195]: time="2025-05-15T00:57:48.215687549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:48.215713 env[1195]: time="2025-05-15T00:57:48.215698339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:48.216008 env[1195]: time="2025-05-15T00:57:48.215935585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0 pid=2920 runtime=io.containerd.runc.v2 May 15 00:57:48.211000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd08948c70 a2=0 a3=7ffd08948c5c items=0 ppid=2638 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.222180 kernel: audit: type=1300 audit(1747270668.211:678): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd08948c70 a2=0 a3=7ffd08948c5c items=0 ppid=2638 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.222286 kernel: audit: type=1327 audit(1747270668.211:678): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:48.211000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:48.235473 systemd[1]: Started cri-containerd-a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0.scope. May 15 00:57:48.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.249674 kernel: audit: type=1400 audit(1747270668.241:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.249717 kernel: audit: type=1400 audit(1747270668.241:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.249732 kernel: audit: type=1400 audit(1747270668.241:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.252859 kernel: audit: type=1400 audit(1747270668.241:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.259240 kernel: audit: type=1400 audit(1747270668.241:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.259304 kernel: audit: type=1400 audit(1747270668.241:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.265804 kernel: audit: type=1400 audit(1747270668.241:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.247000 audit: BPF prog-id=113 op=LOAD May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2920 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396635643535396233643365643838346137613238343863363432 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2920 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396635643535396233643365643838346137613238343863363432 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.248000 audit: BPF prog-id=114 op=LOAD May 15 00:57:48.248000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000265d90 items=0 ppid=2920 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396635643535396233643365643838346137613238343863363432 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.251000 audit: BPF prog-id=115 op=LOAD May 15 00:57:48.251000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000265dd8 items=0 ppid=2920 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396635643535396233643365643838346137613238343863363432 May 15 00:57:48.254000 audit: BPF prog-id=115 op=UNLOAD May 15 00:57:48.254000 audit: BPF prog-id=114 op=UNLOAD May 15 00:57:48.254000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.254000 audit: BPF prog-id=116 op=LOAD May 15 00:57:48.254000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c01e8 items=0 ppid=2920 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396635643535396233643365643838346137613238343863363432 May 15 00:57:48.265987 systemd-resolved[1136]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:48.275816 env[1195]: time="2025-05-15T00:57:48.275758313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x764r,Uid:1cf798ca-ca8a-443d-a705-3bc918c4cdd6,Namespace:calico-system,Attempt:1,} returns sandbox id \"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0\"" May 15 00:57:48.278269 env[1195]: time="2025-05-15T00:57:48.278231935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 00:57:48.522507 kubelet[1438]: E0515 00:57:48.522461 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:48.837000 audit[2955]: NETFILTER_CFG table=filter:76 family=2 entries=16 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.837000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdb4e18210 a2=0 a3=7ffdb4e181fc items=0 ppid=1675 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.845000 audit[2955]: NETFILTER_CFG table=nat:77 family=2 entries=14 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.845000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdb4e18210 a2=0 a3=0 items=0 ppid=1675 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.870000 audit[2958]: NETFILTER_CFG table=filter:78 family=2 entries=13 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.870000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffde5100c80 a2=0 a3=7ffde5100c6c items=0 ppid=1675 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.875000 audit[2958]: NETFILTER_CFG table=nat:79 family=2 entries=35 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.875000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde5100c80 a2=0 a3=7ffde5100c6c items=0 ppid=1675 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.308961 systemd-networkd[1017]: cali476e5776d78: Gained IPv6LL May 15 00:57:49.523388 kubelet[1438]: E0515 00:57:49.523330 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:49.976957 env[1195]: time="2025-05-15T00:57:49.976889983Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:49.978000 audit[2961]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:49.978000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe14d22bb0 a2=0 a3=7ffe14d22b9c items=0 ppid=1675 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:49.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.981653 env[1195]: time="2025-05-15T00:57:49.981617684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:49.983468 env[1195]: time="2025-05-15T00:57:49.983443897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:49.985073 env[1195]: time="2025-05-15T00:57:49.985044378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:49.985478 env[1195]: time="2025-05-15T00:57:49.985443198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 00:57:49.984000 audit[2961]: NETFILTER_CFG table=nat:81 family=2 entries=44 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:49.984000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe14d22bb0 a2=0 a3=7ffe14d22b9c items=0 ppid=1675 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:49.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.988066 env[1195]: time="2025-05-15T00:57:49.988026445Z" level=info msg="CreateContainer within sandbox \"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 00:57:50.006601 env[1195]: time="2025-05-15T00:57:50.006549037Z" level=info msg="CreateContainer within sandbox \"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"92fa7b15b3268e748b3bb6e869c97b4f5dcda4c5a796a4aa593a0d10a4daab7c\"" May 15 00:57:50.007100 env[1195]: time="2025-05-15T00:57:50.007074205Z" level=info msg="StartContainer for \"92fa7b15b3268e748b3bb6e869c97b4f5dcda4c5a796a4aa593a0d10a4daab7c\"" May 15 00:57:50.016670 env[1195]: time="2025-05-15T00:57:50.016545123Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:50.023891 systemd[1]: Started cri-containerd-92fa7b15b3268e748b3bb6e869c97b4f5dcda4c5a796a4aa593a0d10a4daab7c.scope. May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe1d52f6728 items=0 ppid=2920 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932666137623135623332363865373438623362623665383639633937 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit: BPF prog-id=117 op=LOAD May 15 00:57:50.044000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003188f8 items=0 ppid=2920 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932666137623135623332363865373438623362623665383639633937 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit: BPF prog-id=118 op=LOAD May 15 00:57:50.044000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000318948 items=0 ppid=2920 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932666137623135623332363865373438623362623665383639633937 May 15 00:57:50.044000 audit: BPF prog-id=118 op=UNLOAD May 15 00:57:50.044000 audit: BPF prog-id=117 op=UNLOAD May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.044000 audit: BPF prog-id=119 op=LOAD May 15 00:57:50.044000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003189d8 items=0 ppid=2920 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932666137623135623332363865373438623362623665383639633937 May 15 00:57:50.091779 env[1195]: time="2025-05-15T00:57:50.091691452Z" level=info msg="StartContainer for \"92fa7b15b3268e748b3bb6e869c97b4f5dcda4c5a796a4aa593a0d10a4daab7c\" returns successfully" May 15 00:57:50.092967 env[1195]: time="2025-05-15T00:57:50.092941503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.091 [INFO][3002] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.092 [INFO][3002] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" iface="eth0" netns="/var/run/netns/cni-87435200-8fac-15aa-1124-3027b30e7e73" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.092 [INFO][3002] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" iface="eth0" netns="/var/run/netns/cni-87435200-8fac-15aa-1124-3027b30e7e73" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.092 [INFO][3002] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" iface="eth0" netns="/var/run/netns/cni-87435200-8fac-15aa-1124-3027b30e7e73" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.092 [INFO][3002] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.092 [INFO][3002] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.112 [INFO][3029] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.113 [INFO][3029] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.113 [INFO][3029] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.118 [WARNING][3029] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.118 [INFO][3029] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.120 [INFO][3029] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:50.123236 env[1195]: 2025-05-15 00:57:50.122 [INFO][3002] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:50.123763 env[1195]: time="2025-05-15T00:57:50.123426834Z" level=info msg="TearDown network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" successfully" May 15 00:57:50.123763 env[1195]: time="2025-05-15T00:57:50.123457111Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" returns successfully" May 15 00:57:50.124097 env[1195]: time="2025-05-15T00:57:50.124072168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l6cwl,Uid:ce95b523-0ce5-4400-93e0-2fd7f181d579,Namespace:default,Attempt:1,}" May 15 00:57:50.126513 systemd[1]: run-netns-cni\x2d87435200\x2d8fac\x2d15aa\x2d1124\x2d3027b30e7e73.mount: Deactivated successfully. May 15 00:57:50.227834 systemd-networkd[1017]: calic3496142c1a: Link UP May 15 00:57:50.232436 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:50.232533 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic3496142c1a: link becomes ready May 15 00:57:50.232180 systemd-networkd[1017]: calic3496142c1a: Gained carrier May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.168 [INFO][3037] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0 nginx-deployment-7fcdb87857- default ce95b523-0ce5-4400-93e0-2fd7f181d579 1152 0 2025-05-15 00:57:08 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.130 nginx-deployment-7fcdb87857-l6cwl eth0 default [] [] [kns.default ksa.default.default] calic3496142c1a [] []}} ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.168 [INFO][3037] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.192 [INFO][3050] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" HandleID="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.200 [INFO][3050] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" HandleID="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c230), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.130", "pod":"nginx-deployment-7fcdb87857-l6cwl", "timestamp":"2025-05-15 00:57:50.192555398 +0000 UTC"}, Hostname:"10.0.0.130", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.200 [INFO][3050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.200 [INFO][3050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.200 [INFO][3050] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.130' May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.202 [INFO][3050] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.206 [INFO][3050] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.209 [INFO][3050] ipam/ipam.go 489: Trying affinity for 192.168.2.64/26 host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.211 [INFO][3050] ipam/ipam.go 155: Attempting to load block cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.212 [INFO][3050] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.212 [INFO][3050] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.2.64/26 handle="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.213 [INFO][3050] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3 May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.218 [INFO][3050] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.2.64/26 handle="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.223 [INFO][3050] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.2.66/26] block=192.168.2.64/26 handle="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.223 [INFO][3050] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.2.66/26] handle="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" host="10.0.0.130" May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.223 [INFO][3050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:50.246750 env[1195]: 2025-05-15 00:57:50.223 [INFO][3050] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.2.66/26] IPv6=[] ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" HandleID="k8s-pod-network.2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.225 [INFO][3037] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ce95b523-0ce5-4400-93e0-2fd7f181d579", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 57, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-l6cwl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic3496142c1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.225 [INFO][3037] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.2.66/32] ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.225 [INFO][3037] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic3496142c1a ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.232 [INFO][3037] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.232 [INFO][3037] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ce95b523-0ce5-4400-93e0-2fd7f181d579", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 57, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3", Pod:"nginx-deployment-7fcdb87857-l6cwl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic3496142c1a", MAC:"aa:6d:0c:fe:a1:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.247597 env[1195]: 2025-05-15 00:57:50.245 [INFO][3037] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3" Namespace="default" Pod="nginx-deployment-7fcdb87857-l6cwl" WorkloadEndpoint="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:50.253000 audit[3076]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:50.253000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffdf4dfa5f0 a2=0 a3=7ffdf4dfa5dc items=0 ppid=2638 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:50.257601 env[1195]: time="2025-05-15T00:57:50.257524620Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:50.257601 env[1195]: time="2025-05-15T00:57:50.257573702Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:50.257758 env[1195]: time="2025-05-15T00:57:50.257584162Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:50.257932 env[1195]: time="2025-05-15T00:57:50.257769431Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3 pid=3080 runtime=io.containerd.runc.v2 May 15 00:57:50.275159 systemd[1]: Started cri-containerd-2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3.scope. May 15 00:57:50.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit: BPF prog-id=120 op=LOAD May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366338306538373732333432383033366231656361353366663164 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366338306538373732333432383033366231656361353366663164 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.286000 audit: BPF prog-id=121 op=LOAD May 15 00:57:50.286000 audit[3090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d90 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366338306538373732333432383033366231656361353366663164 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit: BPF prog-id=122 op=LOAD May 15 00:57:50.287000 audit[3090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f1dd8 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366338306538373732333432383033366231656361353366663164 May 15 00:57:50.287000 audit: BPF prog-id=122 op=UNLOAD May 15 00:57:50.287000 audit: BPF prog-id=121 op=UNLOAD May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.287000 audit: BPF prog-id=123 op=LOAD May 15 00:57:50.287000 audit[3090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e61e8 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366338306538373732333432383033366231656361353366663164 May 15 00:57:50.289619 systemd-resolved[1136]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:50.315369 env[1195]: time="2025-05-15T00:57:50.315317559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l6cwl,Uid:ce95b523-0ce5-4400-93e0-2fd7f181d579,Namespace:default,Attempt:1,} returns sandbox id \"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3\"" May 15 00:57:50.524026 kubelet[1438]: E0515 00:57:50.523979 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:50.852000 audit[3114]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:50.852000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffebe159c50 a2=0 a3=7ffebe159c3c items=0 ppid=1675 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:50.862000 audit[3114]: NETFILTER_CFG table=nat:84 family=2 entries=56 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:50.862000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffebe159c50 a2=0 a3=7ffebe159c3c items=0 ppid=1675 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:51.125552 systemd[1]: run-containerd-runc-k8s.io-2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3-runc.WSyBty.mount: Deactivated successfully. May 15 00:57:51.409198 kubelet[1438]: E0515 00:57:51.409095 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:51.440477 env[1195]: time="2025-05-15T00:57:51.440426119Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.473 [WARNING][3132] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ce95b523-0ce5-4400-93e0-2fd7f181d579", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 57, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3", Pod:"nginx-deployment-7fcdb87857-l6cwl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic3496142c1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.473 [INFO][3132] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.473 [INFO][3132] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" iface="eth0" netns="" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.473 [INFO][3132] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.473 [INFO][3132] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.494 [INFO][3141] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.494 [INFO][3141] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.494 [INFO][3141] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.501 [WARNING][3141] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.501 [INFO][3141] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.502 [INFO][3141] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:51.504993 env[1195]: 2025-05-15 00:57:51.503 [INFO][3132] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.505532 env[1195]: time="2025-05-15T00:57:51.505034035Z" level=info msg="TearDown network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" successfully" May 15 00:57:51.505532 env[1195]: time="2025-05-15T00:57:51.505079211Z" level=info msg="StopPodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" returns successfully" May 15 00:57:51.505658 env[1195]: time="2025-05-15T00:57:51.505631810Z" level=info msg="RemovePodSandbox for \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:51.505692 env[1195]: time="2025-05-15T00:57:51.505659602Z" level=info msg="Forcibly stopping sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\"" May 15 00:57:51.524149 kubelet[1438]: E0515 00:57:51.524099 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.535 [WARNING][3163] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ce95b523-0ce5-4400-93e0-2fd7f181d579", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 57, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3", Pod:"nginx-deployment-7fcdb87857-l6cwl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic3496142c1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.535 [INFO][3163] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.535 [INFO][3163] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" iface="eth0" netns="" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.535 [INFO][3163] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.535 [INFO][3163] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.552 [INFO][3172] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.552 [INFO][3172] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.552 [INFO][3172] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.557 [WARNING][3172] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.557 [INFO][3172] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" HandleID="k8s-pod-network.9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" Workload="10.0.0.130-k8s-nginx--deployment--7fcdb87857--l6cwl-eth0" May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.559 [INFO][3172] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:51.561312 env[1195]: 2025-05-15 00:57:51.560 [INFO][3163] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd" May 15 00:57:51.561852 env[1195]: time="2025-05-15T00:57:51.561339845Z" level=info msg="TearDown network for sandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" successfully" May 15 00:57:51.563985 env[1195]: time="2025-05-15T00:57:51.563959419Z" level=info msg="RemovePodSandbox \"9d64f3c550970fb10d937fe5486b80719380a9fbf5486550f3858d2358ea5bdd\" returns successfully" May 15 00:57:51.564394 env[1195]: time="2025-05-15T00:57:51.564376744Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.591 [WARNING][3194] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-csi--node--driver--x764r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1cf798ca-ca8a-443d-a705-3bc918c4cdd6", ResourceVersion:"1108", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0", Pod:"csi-node-driver-x764r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.2.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali476e5776d78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.591 [INFO][3194] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.591 [INFO][3194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" iface="eth0" netns="" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.591 [INFO][3194] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.591 [INFO][3194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.608 [INFO][3203] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.608 [INFO][3203] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.608 [INFO][3203] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.614 [WARNING][3203] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.615 [INFO][3203] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.616 [INFO][3203] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:51.619407 env[1195]: 2025-05-15 00:57:51.618 [INFO][3194] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.620086 env[1195]: time="2025-05-15T00:57:51.619439466Z" level=info msg="TearDown network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" successfully" May 15 00:57:51.620086 env[1195]: time="2025-05-15T00:57:51.619473861Z" level=info msg="StopPodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" returns successfully" May 15 00:57:51.620086 env[1195]: time="2025-05-15T00:57:51.619956989Z" level=info msg="RemovePodSandbox for \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:51.620086 env[1195]: time="2025-05-15T00:57:51.619988528Z" level=info msg="Forcibly stopping sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\"" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.649 [WARNING][3226] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-csi--node--driver--x764r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1cf798ca-ca8a-443d-a705-3bc918c4cdd6", ResourceVersion:"1108", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0", Pod:"csi-node-driver-x764r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.2.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali476e5776d78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.649 [INFO][3226] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.649 [INFO][3226] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" iface="eth0" netns="" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.649 [INFO][3226] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.649 [INFO][3226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.665 [INFO][3234] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.665 [INFO][3234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.666 [INFO][3234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.671 [WARNING][3234] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.671 [INFO][3234] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" HandleID="k8s-pod-network.90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" Workload="10.0.0.130-k8s-csi--node--driver--x764r-eth0" May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.673 [INFO][3234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:51.675131 env[1195]: 2025-05-15 00:57:51.674 [INFO][3226] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326" May 15 00:57:51.675131 env[1195]: time="2025-05-15T00:57:51.675099601Z" level=info msg="TearDown network for sandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" successfully" May 15 00:57:51.715567 env[1195]: time="2025-05-15T00:57:51.715509584Z" level=info msg="RemovePodSandbox \"90d61bdba8b9639fff7f0ac7fe3d4ff454336e0fa97a634df8cd914571bd8326\" returns successfully" May 15 00:57:51.716108 env[1195]: time="2025-05-15T00:57:51.716076871Z" level=info msg="StopPodSandbox for \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\"" May 15 00:57:51.716230 env[1195]: time="2025-05-15T00:57:51.716162362Z" level=info msg="TearDown network for sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" successfully" May 15 00:57:51.716230 env[1195]: time="2025-05-15T00:57:51.716222144Z" level=info msg="StopPodSandbox for \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" returns successfully" May 15 00:57:51.716483 env[1195]: time="2025-05-15T00:57:51.716463799Z" level=info msg="RemovePodSandbox for \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\"" May 15 00:57:51.716532 env[1195]: time="2025-05-15T00:57:51.716483035Z" level=info msg="Forcibly stopping sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\"" May 15 00:57:51.716560 env[1195]: time="2025-05-15T00:57:51.716531596Z" level=info msg="TearDown network for sandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" successfully" May 15 00:57:51.719885 env[1195]: time="2025-05-15T00:57:51.719860114Z" level=info msg="RemovePodSandbox \"369641d6ca4fd98df8a620ee298236cb6d025c0d2c4a6752cb50471832f48262\" returns successfully" May 15 00:57:51.720878 env[1195]: time="2025-05-15T00:57:51.720833484Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:51.722615 env[1195]: time="2025-05-15T00:57:51.722580899Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:51.724063 env[1195]: time="2025-05-15T00:57:51.724032288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:51.725341 env[1195]: time="2025-05-15T00:57:51.725307435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:51.725701 env[1195]: time="2025-05-15T00:57:51.725670889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 00:57:51.726504 env[1195]: time="2025-05-15T00:57:51.726474158Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 00:57:51.727495 env[1195]: time="2025-05-15T00:57:51.727465593Z" level=info msg="CreateContainer within sandbox \"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 00:57:51.739906 env[1195]: time="2025-05-15T00:57:51.739857390Z" level=info msg="CreateContainer within sandbox \"a49f5d559b3d3ed884a7a2848c642df2ea54b82a0eed180c300e8853b97bafe0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bf3af2d983cad69e63a1e9bf3e9685c43ac259c6854f79ea222777deeead728b\"" May 15 00:57:51.740325 env[1195]: time="2025-05-15T00:57:51.740306595Z" level=info msg="StartContainer for \"bf3af2d983cad69e63a1e9bf3e9685c43ac259c6854f79ea222777deeead728b\"" May 15 00:57:51.758491 systemd[1]: Started cri-containerd-bf3af2d983cad69e63a1e9bf3e9685c43ac259c6854f79ea222777deeead728b.scope. May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5c0e7452f8 items=0 ppid=2920 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:51.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266336166326439383363616436396536336131653962663365393638 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit: BPF prog-id=124 op=LOAD May 15 00:57:51.768000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248d8 items=0 ppid=2920 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:51.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266336166326439383363616436396536336131653962663365393638 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit: BPF prog-id=125 op=LOAD May 15 00:57:51.768000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024928 items=0 ppid=2920 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:51.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266336166326439383363616436396536336131653962663365393638 May 15 00:57:51.768000 audit: BPF prog-id=125 op=UNLOAD May 15 00:57:51.768000 audit: BPF prog-id=124 op=UNLOAD May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:51.768000 audit: BPF prog-id=126 op=LOAD May 15 00:57:51.768000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000249b8 items=0 ppid=2920 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:51.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266336166326439383363616436396536336131653962663365393638 May 15 00:57:51.782108 env[1195]: time="2025-05-15T00:57:51.782019578Z" level=info msg="StartContainer for \"bf3af2d983cad69e63a1e9bf3e9685c43ac259c6854f79ea222777deeead728b\" returns successfully" May 15 00:57:51.868971 systemd-networkd[1017]: calic3496142c1a: Gained IPv6LL May 15 00:57:52.066239 kubelet[1438]: I0515 00:57:52.066196 1438 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 00:57:52.066239 kubelet[1438]: I0515 00:57:52.066228 1438 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 00:57:52.125129 systemd[1]: run-containerd-runc-k8s.io-bf3af2d983cad69e63a1e9bf3e9685c43ac259c6854f79ea222777deeead728b-runc.sHo4NE.mount: Deactivated successfully. May 15 00:57:52.144844 kubelet[1438]: I0515 00:57:52.144751 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-x764r" podStartSLOduration=56.696265545 podStartE2EDuration="1m0.144731399s" podCreationTimestamp="2025-05-15 00:56:52 +0000 UTC" firstStartedPulling="2025-05-15 00:57:48.27785669 +0000 UTC m=+57.383541171" lastFinishedPulling="2025-05-15 00:57:51.726322554 +0000 UTC m=+60.832007025" observedRunningTime="2025-05-15 00:57:52.144686475 +0000 UTC m=+61.250370956" watchObservedRunningTime="2025-05-15 00:57:52.144731399 +0000 UTC m=+61.250415880" May 15 00:57:52.524698 kubelet[1438]: E0515 00:57:52.524659 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:53.525167 kubelet[1438]: E0515 00:57:53.525109 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:54.525623 kubelet[1438]: E0515 00:57:54.525564 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:54.951149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1858312880.mount: Deactivated successfully. May 15 00:57:55.525762 kubelet[1438]: E0515 00:57:55.525705 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:55.973000 audit[3292]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.986394 kernel: kauditd_printk_skb: 220 callbacks suppressed May 15 00:57:55.986552 kernel: audit: type=1325 audit(1747270675.973:736): table=filter:85 family=2 entries=10 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.986577 kernel: audit: type=1300 audit(1747270675.973:736): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd0f4408b0 a2=0 a3=7ffd0f44089c items=0 ppid=1675 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.986596 kernel: audit: type=1327 audit(1747270675.973:736): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:55.973000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd0f4408b0 a2=0 a3=7ffd0f44089c items=0 ppid=1675 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:55.985000 audit[3292]: NETFILTER_CFG table=nat:86 family=2 entries=20 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.985000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0f4408b0 a2=0 a3=7ffd0f44089c items=0 ppid=1675 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.994617 kernel: audit: type=1325 audit(1747270675.985:737): table=nat:86 family=2 entries=20 op=nft_register_rule pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.994686 kernel: audit: type=1300 audit(1747270675.985:737): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0f4408b0 a2=0 a3=7ffd0f44089c items=0 ppid=1675 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.994707 kernel: audit: type=1327 audit(1747270675.985:737): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:55.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.475000 audit[3294]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.475000 audit[3294]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffff04591f0 a2=0 a3=7ffff04591dc items=0 ppid=1675 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.482263 env[1195]: time="2025-05-15T00:57:56.482194875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:56.484214 env[1195]: time="2025-05-15T00:57:56.484172972Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:56.486013 env[1195]: time="2025-05-15T00:57:56.485988213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:56.487024 kernel: audit: type=1325 audit(1747270676.475:738): table=filter:87 family=2 entries=9 op=nft_register_rule pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.487078 kernel: audit: type=1300 audit(1747270676.475:738): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffff04591f0 a2=0 a3=7ffff04591dc items=0 ppid=1675 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.487097 kernel: audit: type=1327 audit(1747270676.475:738): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.487898 env[1195]: time="2025-05-15T00:57:56.487870671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:56.488495 env[1195]: time="2025-05-15T00:57:56.488473273Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 00:57:56.490819 env[1195]: time="2025-05-15T00:57:56.490761293Z" level=info msg="CreateContainer within sandbox \"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 00:57:56.489000 audit[3294]: NETFILTER_CFG table=nat:88 family=2 entries=27 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.489000 audit[3294]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffff04591f0 a2=0 a3=7ffff04591dc items=0 ppid=1675 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.495822 kernel: audit: type=1325 audit(1747270676.489:739): table=nat:88 family=2 entries=27 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.503450 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1057707271.mount: Deactivated successfully. May 15 00:57:56.505254 env[1195]: time="2025-05-15T00:57:56.505209522Z" level=info msg="CreateContainer within sandbox \"2b6c80e87723428036b1eca53ff1d2b5abc81e4bda06f4db35296ca1956602b3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6357f26d8f7d422e307ad2275430dae8cd7e1137b87faab3943000af524d9683\"" May 15 00:57:56.505712 env[1195]: time="2025-05-15T00:57:56.505687139Z" level=info msg="StartContainer for \"6357f26d8f7d422e307ad2275430dae8cd7e1137b87faab3943000af524d9683\"" May 15 00:57:56.522809 systemd[1]: run-containerd-runc-k8s.io-6357f26d8f7d422e307ad2275430dae8cd7e1137b87faab3943000af524d9683-runc.ylDIDK.mount: Deactivated successfully. May 15 00:57:56.524087 systemd[1]: Started cri-containerd-6357f26d8f7d422e307ad2275430dae8cd7e1137b87faab3943000af524d9683.scope. May 15 00:57:56.526780 kubelet[1438]: E0515 00:57:56.526731 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:56.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit: BPF prog-id=127 op=LOAD May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3080 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633353766323664386637643432326533303761643232373534333064 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3080 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633353766323664386637643432326533303761643232373534333064 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit: BPF prog-id=128 op=LOAD May 15 00:57:56.534000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001fbdc0 items=0 ppid=3080 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633353766323664386637643432326533303761643232373534333064 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit: BPF prog-id=129 op=LOAD May 15 00:57:56.534000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001fbe08 items=0 ppid=3080 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633353766323664386637643432326533303761643232373534333064 May 15 00:57:56.534000 audit: BPF prog-id=129 op=UNLOAD May 15 00:57:56.534000 audit: BPF prog-id=128 op=UNLOAD May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:56.534000 audit: BPF prog-id=130 op=LOAD May 15 00:57:56.534000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d8218 items=0 ppid=3080 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633353766323664386637643432326533303761643232373534333064 May 15 00:57:56.579585 env[1195]: time="2025-05-15T00:57:56.579522069Z" level=info msg="StartContainer for \"6357f26d8f7d422e307ad2275430dae8cd7e1137b87faab3943000af524d9683\" returns successfully" May 15 00:57:57.203643 kubelet[1438]: I0515 00:57:57.203541 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-l6cwl" podStartSLOduration=43.030113905 podStartE2EDuration="49.203519508s" podCreationTimestamp="2025-05-15 00:57:08 +0000 UTC" firstStartedPulling="2025-05-15 00:57:50.316200599 +0000 UTC m=+59.421885080" lastFinishedPulling="2025-05-15 00:57:56.489606202 +0000 UTC m=+65.595290683" observedRunningTime="2025-05-15 00:57:57.203267435 +0000 UTC m=+66.308951936" watchObservedRunningTime="2025-05-15 00:57:57.203519508 +0000 UTC m=+66.309203989" May 15 00:57:57.527382 kubelet[1438]: E0515 00:57:57.527323 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:58.527658 kubelet[1438]: E0515 00:57:58.527609 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:57:58.973000 audit[3355]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=3355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:58.973000 audit[3355]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca0f65a80 a2=0 a3=7ffca0f65a6c items=0 ppid=1675 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:58.984000 audit[3355]: NETFILTER_CFG table=nat:90 family=2 entries=30 op=nft_register_rule pid=3355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:58.984000 audit[3355]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffca0f65a80 a2=0 a3=7ffca0f65a6c items=0 ppid=1675 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.284000 audit[3357]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:59.284000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccfd3e340 a2=0 a3=7ffccfd3e32c items=0 ppid=1675 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:59.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.289000 audit[3357]: NETFILTER_CFG table=nat:92 family=2 entries=34 op=nft_register_chain pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:59.289000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffccfd3e340 a2=0 a3=7ffccfd3e32c items=0 ppid=1675 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:59.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.527949 kubelet[1438]: E0515 00:57:59.527912 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:00.528447 kubelet[1438]: E0515 00:58:00.528371 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:01.529530 kubelet[1438]: E0515 00:58:01.529465 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:02.062000 audit[3361]: NETFILTER_CFG table=filter:93 family=2 entries=20 op=nft_register_rule pid=3361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.065415 kernel: kauditd_printk_skb: 71 callbacks suppressed May 15 00:58:02.065520 kernel: audit: type=1325 audit(1747270682.062:762): table=filter:93 family=2 entries=20 op=nft_register_rule pid=3361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.062000 audit[3361]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe71b6faf0 a2=0 a3=7ffe71b6fadc items=0 ppid=1675 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.073603 kernel: audit: type=1300 audit(1747270682.062:762): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe71b6faf0 a2=0 a3=7ffe71b6fadc items=0 ppid=1675 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.073717 kernel: audit: type=1327 audit(1747270682.062:762): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.078000 audit[3361]: NETFILTER_CFG table=nat:94 family=2 entries=22 op=nft_register_rule pid=3361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.078000 audit[3361]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe71b6faf0 a2=0 a3=0 items=0 ppid=1675 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.087676 kernel: audit: type=1325 audit(1747270682.078:763): table=nat:94 family=2 entries=22 op=nft_register_rule pid=3361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.087719 kernel: audit: type=1300 audit(1747270682.078:763): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe71b6faf0 a2=0 a3=0 items=0 ppid=1675 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.087748 kernel: audit: type=1327 audit(1747270682.078:763): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.095000 audit[3363]: NETFILTER_CFG table=filter:95 family=2 entries=32 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.095000 audit[3363]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8a5f85a0 a2=0 a3=7ffe8a5f858c items=0 ppid=1675 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.104438 kernel: audit: type=1325 audit(1747270682.095:764): table=filter:95 family=2 entries=32 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.104483 kernel: audit: type=1300 audit(1747270682.095:764): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8a5f85a0 a2=0 a3=7ffe8a5f858c items=0 ppid=1675 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.104500 kernel: audit: type=1327 audit(1747270682.095:764): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.109000 audit[3363]: NETFILTER_CFG table=nat:96 family=2 entries=22 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.109000 audit[3363]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8a5f85a0 a2=0 a3=0 items=0 ppid=1675 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.114837 kernel: audit: type=1325 audit(1747270682.109:765): table=nat:96 family=2 entries=22 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.115282 systemd[1]: Created slice kubepods-besteffort-poda88b0307_01ee_46de_8f9a_04d71ed62103.slice. May 15 00:58:02.142564 kubelet[1438]: I0515 00:58:02.142501 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a88b0307-01ee-46de-8f9a-04d71ed62103-data\") pod \"nfs-server-provisioner-0\" (UID: \"a88b0307-01ee-46de-8f9a-04d71ed62103\") " pod="default/nfs-server-provisioner-0" May 15 00:58:02.142564 kubelet[1438]: I0515 00:58:02.142540 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lslrs\" (UniqueName: \"kubernetes.io/projected/a88b0307-01ee-46de-8f9a-04d71ed62103-kube-api-access-lslrs\") pod \"nfs-server-provisioner-0\" (UID: \"a88b0307-01ee-46de-8f9a-04d71ed62103\") " pod="default/nfs-server-provisioner-0" May 15 00:58:02.418587 env[1195]: time="2025-05-15T00:58:02.418476180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a88b0307-01ee-46de-8f9a-04d71ed62103,Namespace:default,Attempt:0,}" May 15 00:58:02.530618 kubelet[1438]: E0515 00:58:02.530549 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:03.015562 kubelet[1438]: E0515 00:58:03.015526 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:03.042309 systemd-networkd[1017]: cali60e51b789ff: Link UP May 15 00:58:03.044829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:58:03.044963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 00:58:03.044869 systemd-networkd[1017]: cali60e51b789ff: Gained carrier May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:02.984 [INFO][3365] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.130-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a88b0307-01ee-46de-8f9a-04d71ed62103 1291 0 2025-05-15 00:58:02 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.130 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:02.984 [INFO][3365] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.009 [INFO][3381] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" HandleID="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Workload="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.017 [INFO][3381] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" HandleID="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Workload="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004359a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.130", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 00:58:03.008987028 +0000 UTC"}, Hostname:"10.0.0.130", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.017 [INFO][3381] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.017 [INFO][3381] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.017 [INFO][3381] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.130' May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.019 [INFO][3381] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.023 [INFO][3381] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.026 [INFO][3381] ipam/ipam.go 489: Trying affinity for 192.168.2.64/26 host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.028 [INFO][3381] ipam/ipam.go 155: Attempting to load block cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.029 [INFO][3381] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.030 [INFO][3381] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.2.64/26 handle="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.031 [INFO][3381] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33 May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.034 [INFO][3381] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.2.64/26 handle="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.038 [INFO][3381] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.2.67/26] block=192.168.2.64/26 handle="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.039 [INFO][3381] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.2.67/26] handle="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" host="10.0.0.130" May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.039 [INFO][3381] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:58:03.056589 env[1195]: 2025-05-15 00:58:03.039 [INFO][3381] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.2.67/26] IPv6=[] ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" HandleID="k8s-pod-network.3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Workload="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.057253 env[1195]: 2025-05-15 00:58:03.040 [INFO][3365] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a88b0307-01ee-46de-8f9a-04d71ed62103", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 58, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.2.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:58:03.057253 env[1195]: 2025-05-15 00:58:03.040 [INFO][3365] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.2.67/32] ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.057253 env[1195]: 2025-05-15 00:58:03.040 [INFO][3365] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.057253 env[1195]: 2025-05-15 00:58:03.045 [INFO][3365] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.057417 env[1195]: 2025-05-15 00:58:03.045 [INFO][3365] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a88b0307-01ee-46de-8f9a-04d71ed62103", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 58, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.2.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:e3:fa:21:37:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:58:03.057417 env[1195]: 2025-05-15 00:58:03.055 [INFO][3365] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.130-k8s-nfs--server--provisioner--0-eth0" May 15 00:58:03.065000 audit[3402]: NETFILTER_CFG table=filter:97 family=2 entries=38 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:58:03.065000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd5482fa70 a2=0 a3=7ffd5482fa5c items=0 ppid=2638 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.065000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:58:03.070882 env[1195]: time="2025-05-15T00:58:03.070774160Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:58:03.071060 env[1195]: time="2025-05-15T00:58:03.071031434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:58:03.071180 env[1195]: time="2025-05-15T00:58:03.071153673Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:58:03.071475 env[1195]: time="2025-05-15T00:58:03.071444009Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33 pid=3410 runtime=io.containerd.runc.v2 May 15 00:58:03.087538 systemd[1]: Started cri-containerd-3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33.scope. May 15 00:58:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit: BPF prog-id=131 op=LOAD May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3410 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365643363363238376233653463643366383737326135353266323833 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3410 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365643363363238376233653463643366383737326135353266323833 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit: BPF prog-id=132 op=LOAD May 15 00:58:03.095000 audit[3419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255a20 items=0 ppid=3410 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365643363363238376233653463643366383737326135353266323833 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit: BPF prog-id=133 op=LOAD May 15 00:58:03.095000 audit[3419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000255a68 items=0 ppid=3410 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365643363363238376233653463643366383737326135353266323833 May 15 00:58:03.095000 audit: BPF prog-id=133 op=UNLOAD May 15 00:58:03.095000 audit: BPF prog-id=132 op=UNLOAD May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { perfmon } for pid=3419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit[3419]: AVC avc: denied { bpf } for pid=3419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:03.095000 audit: BPF prog-id=134 op=LOAD May 15 00:58:03.095000 audit[3419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000255e78 items=0 ppid=3410 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365643363363238376233653463643366383737326135353266323833 May 15 00:58:03.098315 systemd-resolved[1136]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:58:03.118894 env[1195]: time="2025-05-15T00:58:03.118849892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a88b0307-01ee-46de-8f9a-04d71ed62103,Namespace:default,Attempt:0,} returns sandbox id \"3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33\"" May 15 00:58:03.121327 env[1195]: time="2025-05-15T00:58:03.121295114Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 00:58:03.531743 kubelet[1438]: E0515 00:58:03.531697 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:04.413194 systemd-networkd[1017]: cali60e51b789ff: Gained IPv6LL May 15 00:58:04.532495 kubelet[1438]: E0515 00:58:04.532443 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:05.532751 kubelet[1438]: E0515 00:58:05.532689 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:05.672080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount728510193.mount: Deactivated successfully. May 15 00:58:06.533872 kubelet[1438]: E0515 00:58:06.533822 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:07.534467 kubelet[1438]: E0515 00:58:07.534421 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:07.850973 env[1195]: time="2025-05-15T00:58:07.850876316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:07.853081 env[1195]: time="2025-05-15T00:58:07.853050408Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:07.854518 env[1195]: time="2025-05-15T00:58:07.854482467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:07.856637 env[1195]: time="2025-05-15T00:58:07.856588733Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:07.857288 env[1195]: time="2025-05-15T00:58:07.857256256Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 00:58:07.859059 env[1195]: time="2025-05-15T00:58:07.859031269Z" level=info msg="CreateContainer within sandbox \"3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 00:58:07.869754 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3363461060.mount: Deactivated successfully. May 15 00:58:07.870073 env[1195]: time="2025-05-15T00:58:07.870033037Z" level=info msg="CreateContainer within sandbox \"3ed3c6287b3e4cd3f8772a552f283df35ee3d797580210f846542ef912f7fd33\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"4b6587c920aa541f8cda83408a18946caeb9c1df0ad4321a40bbdad378d1d4c4\"" May 15 00:58:07.870559 env[1195]: time="2025-05-15T00:58:07.870534849Z" level=info msg="StartContainer for \"4b6587c920aa541f8cda83408a18946caeb9c1df0ad4321a40bbdad378d1d4c4\"" May 15 00:58:07.887423 systemd[1]: run-containerd-runc-k8s.io-4b6587c920aa541f8cda83408a18946caeb9c1df0ad4321a40bbdad378d1d4c4-runc.popYBG.mount: Deactivated successfully. May 15 00:58:07.889121 systemd[1]: Started cri-containerd-4b6587c920aa541f8cda83408a18946caeb9c1df0ad4321a40bbdad378d1d4c4.scope. May 15 00:58:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.908026 kernel: kauditd_printk_skb: 62 callbacks suppressed May 15 00:58:07.908078 kernel: audit: type=1400 audit(1747270687.904:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.914304 kernel: audit: type=1400 audit(1747270687.905:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.914345 kernel: audit: type=1400 audit(1747270687.905:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.916980 kernel: audit: type=1400 audit(1747270687.905:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.924486 kernel: audit: type=1400 audit(1747270687.905:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.924526 kernel: audit: type=1400 audit(1747270687.905:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.927727 kernel: audit: type=1400 audit(1747270687.905:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.934159 kernel: audit: type=1400 audit(1747270687.905:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.937689 kernel: audit: type=1400 audit(1747270687.905:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.937733 kernel: audit: type=1400 audit(1747270687.909:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit: BPF prog-id=135 op=LOAD May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363538376339323061613534316638636461383334303861313839 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363538376339323061613534316638636461383334303861313839 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.909000 audit: BPF prog-id=136 op=LOAD May 15 00:58:07.909000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304ad0 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363538376339323061613534316638636461383334303861313839 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.915000 audit: BPF prog-id=137 op=LOAD May 15 00:58:07.915000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304b18 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363538376339323061613534316638636461383334303861313839 May 15 00:58:07.919000 audit: BPF prog-id=137 op=UNLOAD May 15 00:58:07.919000 audit: BPF prog-id=136 op=UNLOAD May 15 00:58:07.919000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:07.919000 audit: BPF prog-id=138 op=LOAD May 15 00:58:07.919000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304f28 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363538376339323061613534316638636461383334303861313839 May 15 00:58:07.987000 audit[3487]: AVC avc: denied { search } for pid=3487 comm="rpcbind" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 00:58:07.987000 audit[3487]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd432a460c0 a2=0 a3=0 items=0 ppid=3466 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 key=(null) May 15 00:58:07.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 00:58:08.124336 env[1195]: time="2025-05-15T00:58:08.124207658Z" level=info msg="StartContainer for \"4b6587c920aa541f8cda83408a18946caeb9c1df0ad4321a40bbdad378d1d4c4\" returns successfully" May 15 00:58:08.159000 audit[3494]: AVC avc: denied { search } for pid=3494 comm="dbus-daemon" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 00:58:08.159000 audit[3494]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe39327d0c0 a2=0 a3=0 items=0 ppid=3466 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 key=(null) May 15 00:58:08.159000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 00:58:08.161000 audit[3495]: AVC avc: denied { watch } for pid=3495 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c349,c986 tclass=dir permissive=0 May 15 00:58:08.161000 audit[3495]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56126aa5cbe0 a2=2c8 a3=7ffc4af8207c items=0 ppid=3466 pid=3495 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 key=(null) May 15 00:58:08.161000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 00:58:08.164000 audit[3496]: AVC avc: denied { read } for pid=3496 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24666 scontext=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 00:58:08.164000 audit[3496]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f02460ee320 a1=80000 a2=d a3=7ffdffeed270 items=0 ppid=3466 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 key=(null) May 15 00:58:08.164000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 00:58:08.165000 audit[3496]: AVC avc: denied { search } for pid=3496 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 00:58:08.165000 audit[3496]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f02456420c0 a2=0 a3=0 items=0 ppid=3466 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c349,c986 key=(null) May 15 00:58:08.165000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 00:58:08.176157 kubelet[1438]: I0515 00:58:08.176092 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.438834632 podStartE2EDuration="6.176069275s" podCreationTimestamp="2025-05-15 00:58:02 +0000 UTC" firstStartedPulling="2025-05-15 00:58:03.120825643 +0000 UTC m=+72.226510134" lastFinishedPulling="2025-05-15 00:58:07.858060296 +0000 UTC m=+76.963744777" observedRunningTime="2025-05-15 00:58:08.175982583 +0000 UTC m=+77.281667064" watchObservedRunningTime="2025-05-15 00:58:08.176069275 +0000 UTC m=+77.281753756" May 15 00:58:08.187000 audit[3509]: NETFILTER_CFG table=filter:98 family=2 entries=20 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:08.187000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc9c359f60 a2=0 a3=7ffc9c359f4c items=0 ppid=1675 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:08.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:08.193000 audit[3509]: NETFILTER_CFG table=nat:99 family=2 entries=106 op=nft_register_chain pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:08.193000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc9c359f60 a2=0 a3=7ffc9c359f4c items=0 ppid=1675 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:08.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:08.534842 kubelet[1438]: E0515 00:58:08.534807 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:09.535400 kubelet[1438]: E0515 00:58:09.535342 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:10.536547 kubelet[1438]: E0515 00:58:10.536486 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:11.408450 kubelet[1438]: E0515 00:58:11.408390 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:11.537475 kubelet[1438]: E0515 00:58:11.537420 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:12.537718 kubelet[1438]: E0515 00:58:12.537686 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:13.538648 kubelet[1438]: E0515 00:58:13.538532 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:14.539653 kubelet[1438]: E0515 00:58:14.539584 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:15.170658 kubelet[1438]: E0515 00:58:15.170616 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:15.540776 kubelet[1438]: E0515 00:58:15.540707 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:16.541858 kubelet[1438]: E0515 00:58:16.541780 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:17.542754 kubelet[1438]: E0515 00:58:17.542722 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:18.090342 systemd[1]: Created slice kubepods-besteffort-podc268485d_1968_4e88_bb98_d71affca8ca0.slice. May 15 00:58:18.135155 kubelet[1438]: I0515 00:58:18.135102 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4tnpm\" (UniqueName: \"kubernetes.io/projected/c268485d-1968-4e88-bb98-d71affca8ca0-kube-api-access-4tnpm\") pod \"test-pod-1\" (UID: \"c268485d-1968-4e88-bb98-d71affca8ca0\") " pod="default/test-pod-1" May 15 00:58:18.135155 kubelet[1438]: I0515 00:58:18.135143 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b2bd2cc1-64cc-413f-a546-5674838cb404\" (UniqueName: \"kubernetes.io/nfs/c268485d-1968-4e88-bb98-d71affca8ca0-pvc-b2bd2cc1-64cc-413f-a546-5674838cb404\") pod \"test-pod-1\" (UID: \"c268485d-1968-4e88-bb98-d71affca8ca0\") " pod="default/test-pod-1" May 15 00:58:18.244000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.248029 kernel: Failed to create system directory netfs May 15 00:58:18.248088 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 00:58:18.248121 kernel: audit: type=1400 audit(1747270698.244:810): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.248152 kernel: Failed to create system directory netfs May 15 00:58:18.244000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.252447 kernel: audit: type=1400 audit(1747270698.244:810): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.252486 kernel: Failed to create system directory netfs May 15 00:58:18.253186 kernel: audit: type=1400 audit(1747270698.244:810): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.244000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.244000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.261350 kernel: Failed to create system directory netfs May 15 00:58:18.261390 kernel: audit: type=1400 audit(1747270698.244:810): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.244000 audit[3542]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562c11dc05e0 a1=153bc a2=562bf1be52b0 a3=5 items=0 ppid=9 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.269811 kernel: audit: type=1300 audit(1747270698.244:810): arch=c000003e syscall=175 success=yes exit=0 a0=562c11dc05e0 a1=153bc a2=562bf1be52b0 a3=5 items=0 ppid=9 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.269916 kernel: audit: type=1327 audit(1747270698.244:810): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 00:58:18.244000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.276554 kernel: Failed to create system directory fscache May 15 00:58:18.276605 kernel: audit: type=1400 audit(1747270698.268:811): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.276624 kernel: Failed to create system directory fscache May 15 00:58:18.276640 kernel: audit: type=1400 audit(1747270698.268:811): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.282041 kernel: Failed to create system directory fscache May 15 00:58:18.282087 kernel: audit: type=1400 audit(1747270698.268:811): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.282106 kernel: Failed to create system directory fscache May 15 00:58:18.285235 kernel: audit: type=1400 audit(1747270698.268:811): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.290638 kernel: Failed to create system directory fscache May 15 00:58:18.290670 kernel: Failed to create system directory fscache May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.292259 kernel: Failed to create system directory fscache May 15 00:58:18.292291 kernel: Failed to create system directory fscache May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.294102 kernel: Failed to create system directory fscache May 15 00:58:18.294147 kernel: Failed to create system directory fscache May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.296543 kernel: Failed to create system directory fscache May 15 00:58:18.296634 kernel: Failed to create system directory fscache May 15 00:58:18.296651 kernel: Failed to create system directory fscache May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.268000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.298273 kernel: Failed to create system directory fscache May 15 00:58:18.268000 audit[3542]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562c11fd59c0 a1=4c0fc a2=562bf1be52b0 a3=5 items=0 ppid=9 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.268000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 00:58:18.300910 kernel: FS-Cache: Loaded May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.331823 kernel: Failed to create system directory sunrpc May 15 00:58:18.331857 kernel: Failed to create system directory sunrpc May 15 00:58:18.331873 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.333256 kernel: Failed to create system directory sunrpc May 15 00:58:18.333285 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.335428 kernel: Failed to create system directory sunrpc May 15 00:58:18.335450 kernel: Failed to create system directory sunrpc May 15 00:58:18.335463 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.336908 kernel: Failed to create system directory sunrpc May 15 00:58:18.336942 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.338334 kernel: Failed to create system directory sunrpc May 15 00:58:18.338355 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.339819 kernel: Failed to create system directory sunrpc May 15 00:58:18.339841 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.341498 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.342475 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.343385 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.344159 kernel: Failed to create system directory sunrpc May 15 00:58:18.344196 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.345806 kernel: Failed to create system directory sunrpc May 15 00:58:18.345843 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.347391 kernel: Failed to create system directory sunrpc May 15 00:58:18.347440 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.348844 kernel: Failed to create system directory sunrpc May 15 00:58:18.348877 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.350309 kernel: Failed to create system directory sunrpc May 15 00:58:18.350349 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.351034 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.351810 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.353227 kernel: Failed to create system directory sunrpc May 15 00:58:18.353262 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.355427 kernel: Failed to create system directory sunrpc May 15 00:58:18.355462 kernel: Failed to create system directory sunrpc May 15 00:58:18.355481 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.356885 kernel: Failed to create system directory sunrpc May 15 00:58:18.356917 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.358313 kernel: Failed to create system directory sunrpc May 15 00:58:18.358347 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.360466 kernel: Failed to create system directory sunrpc May 15 00:58:18.360497 kernel: Failed to create system directory sunrpc May 15 00:58:18.360519 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.361990 kernel: Failed to create system directory sunrpc May 15 00:58:18.362026 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.363414 kernel: Failed to create system directory sunrpc May 15 00:58:18.363447 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.364855 kernel: Failed to create system directory sunrpc May 15 00:58:18.364886 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.366308 kernel: Failed to create system directory sunrpc May 15 00:58:18.366344 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.367824 kernel: Failed to create system directory sunrpc May 15 00:58:18.367856 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.369249 kernel: Failed to create system directory sunrpc May 15 00:58:18.369289 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.371449 kernel: Failed to create system directory sunrpc May 15 00:58:18.371496 kernel: Failed to create system directory sunrpc May 15 00:58:18.371519 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.372927 kernel: Failed to create system directory sunrpc May 15 00:58:18.372960 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.374412 kernel: Failed to create system directory sunrpc May 15 00:58:18.374455 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.375861 kernel: Failed to create system directory sunrpc May 15 00:58:18.375905 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.377276 kernel: Failed to create system directory sunrpc May 15 00:58:18.377310 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.379422 kernel: Failed to create system directory sunrpc May 15 00:58:18.379454 kernel: Failed to create system directory sunrpc May 15 00:58:18.379471 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.380943 kernel: Failed to create system directory sunrpc May 15 00:58:18.380977 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.382412 kernel: Failed to create system directory sunrpc May 15 00:58:18.382438 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.383862 kernel: Failed to create system directory sunrpc May 15 00:58:18.383890 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.385287 kernel: Failed to create system directory sunrpc May 15 00:58:18.385319 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.387435 kernel: Failed to create system directory sunrpc May 15 00:58:18.387461 kernel: Failed to create system directory sunrpc May 15 00:58:18.387484 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.388911 kernel: Failed to create system directory sunrpc May 15 00:58:18.388952 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.390368 kernel: Failed to create system directory sunrpc May 15 00:58:18.390396 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.391843 kernel: Failed to create system directory sunrpc May 15 00:58:18.391886 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.393299 kernel: Failed to create system directory sunrpc May 15 00:58:18.393344 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.394804 kernel: Failed to create system directory sunrpc May 15 00:58:18.394833 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.396276 kernel: Failed to create system directory sunrpc May 15 00:58:18.396304 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.397863 kernel: Failed to create system directory sunrpc May 15 00:58:18.397889 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.399441 kernel: Failed to create system directory sunrpc May 15 00:58:18.399460 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.400978 kernel: Failed to create system directory sunrpc May 15 00:58:18.400997 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.402423 kernel: Failed to create system directory sunrpc May 15 00:58:18.402463 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.403859 kernel: Failed to create system directory sunrpc May 15 00:58:18.403882 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.405302 kernel: Failed to create system directory sunrpc May 15 00:58:18.405324 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.407470 kernel: Failed to create system directory sunrpc May 15 00:58:18.407489 kernel: Failed to create system directory sunrpc May 15 00:58:18.407506 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.408919 kernel: Failed to create system directory sunrpc May 15 00:58:18.408937 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.410348 kernel: Failed to create system directory sunrpc May 15 00:58:18.410369 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.411806 kernel: Failed to create system directory sunrpc May 15 00:58:18.411829 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.413235 kernel: Failed to create system directory sunrpc May 15 00:58:18.413262 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.415384 kernel: Failed to create system directory sunrpc May 15 00:58:18.415405 kernel: Failed to create system directory sunrpc May 15 00:58:18.415421 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.416832 kernel: Failed to create system directory sunrpc May 15 00:58:18.416854 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.418254 kernel: Failed to create system directory sunrpc May 15 00:58:18.418277 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.420406 kernel: Failed to create system directory sunrpc May 15 00:58:18.420423 kernel: Failed to create system directory sunrpc May 15 00:58:18.420440 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.421849 kernel: Failed to create system directory sunrpc May 15 00:58:18.421870 kernel: Failed to create system directory sunrpc May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.320000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.423283 kernel: Failed to create system directory sunrpc May 15 00:58:18.432845 kernel: RPC: Registered named UNIX socket transport module. May 15 00:58:18.432943 kernel: RPC: Registered udp transport module. May 15 00:58:18.432959 kernel: RPC: Registered tcp transport module. May 15 00:58:18.434421 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 00:58:18.320000 audit[3542]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562c12021ad0 a1=1a814c a2=562bf1be52b0 a3=5 items=6 ppid=9 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.320000 audit: CWD cwd="/" May 15 00:58:18.320000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PATH item=1 name=(null) inode=24739 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PATH item=2 name=(null) inode=24739 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PATH item=3 name=(null) inode=24740 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PATH item=4 name=(null) inode=24739 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PATH item=5 name=(null) inode=24741 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:58:18.320000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.475395 kernel: Failed to create system directory nfs May 15 00:58:18.475444 kernel: Failed to create system directory nfs May 15 00:58:18.475459 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.478039 kernel: Failed to create system directory nfs May 15 00:58:18.478067 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.480489 kernel: Failed to create system directory nfs May 15 00:58:18.480510 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.484141 kernel: Failed to create system directory nfs May 15 00:58:18.484180 kernel: Failed to create system directory nfs May 15 00:58:18.484194 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.486670 kernel: Failed to create system directory nfs May 15 00:58:18.486692 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.489144 kernel: Failed to create system directory nfs May 15 00:58:18.489196 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.491420 kernel: Failed to create system directory nfs May 15 00:58:18.491445 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.495274 kernel: Failed to create system directory nfs May 15 00:58:18.495296 kernel: Failed to create system directory nfs May 15 00:58:18.495316 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.497495 kernel: Failed to create system directory nfs May 15 00:58:18.497531 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.499680 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.500554 kernel: Failed to create system directory nfs May 15 00:58:18.500589 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.502110 kernel: Failed to create system directory nfs May 15 00:58:18.502144 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.504292 kernel: Failed to create system directory nfs May 15 00:58:18.504340 kernel: Failed to create system directory nfs May 15 00:58:18.504357 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.506372 kernel: Failed to create system directory nfs May 15 00:58:18.506406 kernel: Failed to create system directory nfs May 15 00:58:18.506426 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.508447 kernel: Failed to create system directory nfs May 15 00:58:18.508474 kernel: Failed to create system directory nfs May 15 00:58:18.508497 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.509853 kernel: Failed to create system directory nfs May 15 00:58:18.509878 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.511223 kernel: Failed to create system directory nfs May 15 00:58:18.511248 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.513305 kernel: Failed to create system directory nfs May 15 00:58:18.513336 kernel: Failed to create system directory nfs May 15 00:58:18.513364 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.515420 kernel: Failed to create system directory nfs May 15 00:58:18.515448 kernel: Failed to create system directory nfs May 15 00:58:18.515468 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.516812 kernel: Failed to create system directory nfs May 15 00:58:18.516841 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.518203 kernel: Failed to create system directory nfs May 15 00:58:18.518237 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.520273 kernel: Failed to create system directory nfs May 15 00:58:18.520301 kernel: Failed to create system directory nfs May 15 00:58:18.520315 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.520983 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.522415 kernel: Failed to create system directory nfs May 15 00:58:18.522453 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.523856 kernel: Failed to create system directory nfs May 15 00:58:18.523885 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.525256 kernel: Failed to create system directory nfs May 15 00:58:18.525289 kernel: Failed to create system directory nfs May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.462000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.526800 kernel: Failed to create system directory nfs May 15 00:58:18.543232 kubelet[1438]: E0515 00:58:18.543200 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:18.547879 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 00:58:18.462000 audit[3542]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562c12242a10 a1=16eae4 a2=562bf1be52b0 a3=5 items=0 ppid=9 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.462000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.586212 kernel: Failed to create system directory nfs4 May 15 00:58:18.586252 kernel: Failed to create system directory nfs4 May 15 00:58:18.586271 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.588449 kernel: Failed to create system directory nfs4 May 15 00:58:18.588479 kernel: Failed to create system directory nfs4 May 15 00:58:18.588502 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.589955 kernel: Failed to create system directory nfs4 May 15 00:58:18.589979 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.591430 kernel: Failed to create system directory nfs4 May 15 00:58:18.591453 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.592244 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.595213 kernel: Failed to create system directory nfs4 May 15 00:58:18.595278 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.598792 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.600359 kernel: Failed to create system directory nfs4 May 15 00:58:18.600397 kernel: Failed to create system directory nfs4 May 15 00:58:18.600423 kernel: Failed to create system directory nfs4 May 15 00:58:18.601185 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.601937 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.603530 kernel: Failed to create system directory nfs4 May 15 00:58:18.603637 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.604419 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.606108 kernel: Failed to create system directory nfs4 May 15 00:58:18.606141 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.607836 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.609359 kernel: Failed to create system directory nfs4 May 15 00:58:18.609390 kernel: Failed to create system directory nfs4 May 15 00:58:18.609404 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.610815 kernel: Failed to create system directory nfs4 May 15 00:58:18.610851 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.612243 kernel: Failed to create system directory nfs4 May 15 00:58:18.612364 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.613134 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.614594 kernel: Failed to create system directory nfs4 May 15 00:58:18.614777 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.616095 kernel: Failed to create system directory nfs4 May 15 00:58:18.616127 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.618511 kernel: Failed to create system directory nfs4 May 15 00:58:18.618538 kernel: Failed to create system directory nfs4 May 15 00:58:18.618556 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.620252 kernel: Failed to create system directory nfs4 May 15 00:58:18.620297 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.622188 kernel: Failed to create system directory nfs4 May 15 00:58:18.622225 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.623951 kernel: Failed to create system directory nfs4 May 15 00:58:18.623991 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.626510 kernel: Failed to create system directory nfs4 May 15 00:58:18.626536 kernel: Failed to create system directory nfs4 May 15 00:58:18.626552 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.628233 kernel: Failed to create system directory nfs4 May 15 00:58:18.628268 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.630389 kernel: Failed to create system directory nfs4 May 15 00:58:18.630430 kernel: Failed to create system directory nfs4 May 15 00:58:18.630447 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.631859 kernel: Failed to create system directory nfs4 May 15 00:58:18.631900 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.633319 kernel: Failed to create system directory nfs4 May 15 00:58:18.633353 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.634816 kernel: Failed to create system directory nfs4 May 15 00:58:18.634845 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.636256 kernel: Failed to create system directory nfs4 May 15 00:58:18.636291 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.637836 kernel: Failed to create system directory nfs4 May 15 00:58:18.637864 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.639485 kernel: Failed to create system directory nfs4 May 15 00:58:18.639518 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.641110 kernel: Failed to create system directory nfs4 May 15 00:58:18.641136 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.643411 kernel: Failed to create system directory nfs4 May 15 00:58:18.643442 kernel: Failed to create system directory nfs4 May 15 00:58:18.643463 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.644883 kernel: Failed to create system directory nfs4 May 15 00:58:18.644922 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.646424 kernel: Failed to create system directory nfs4 May 15 00:58:18.646449 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.648036 kernel: Failed to create system directory nfs4 May 15 00:58:18.648070 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.649467 kernel: Failed to create system directory nfs4 May 15 00:58:18.649491 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.650949 kernel: Failed to create system directory nfs4 May 15 00:58:18.650974 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.652522 kernel: Failed to create system directory nfs4 May 15 00:58:18.652553 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.654046 kernel: Failed to create system directory nfs4 May 15 00:58:18.654073 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.656452 kernel: Failed to create system directory nfs4 May 15 00:58:18.656471 kernel: Failed to create system directory nfs4 May 15 00:58:18.656492 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.658119 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.658985 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.659853 kernel: Failed to create system directory nfs4 May 15 00:58:18.659886 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.661490 kernel: Failed to create system directory nfs4 May 15 00:58:18.661557 kernel: Failed to create system directory nfs4 May 15 00:58:18.573000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.798373 kernel: NFS: Registering the id_resolver key type May 15 00:58:18.798501 kernel: Key type id_resolver registered May 15 00:58:18.798520 kernel: Key type id_legacy registered May 15 00:58:18.573000 audit[3547]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7faa1cd9e010 a1=209404 a2=56334d7ec2b0 a3=5 items=0 ppid=9 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.573000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.811368 kernel: Failed to create system directory rpcgss May 15 00:58:18.811392 kernel: Failed to create system directory rpcgss May 15 00:58:18.811405 kernel: Failed to create system directory rpcgss May 15 00:58:18.811418 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.812900 kernel: Failed to create system directory rpcgss May 15 00:58:18.812930 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.814421 kernel: Failed to create system directory rpcgss May 15 00:58:18.814454 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.815879 kernel: Failed to create system directory rpcgss May 15 00:58:18.815897 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.817317 kernel: Failed to create system directory rpcgss May 15 00:58:18.817340 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.818837 kernel: Failed to create system directory rpcgss May 15 00:58:18.818864 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.820322 kernel: Failed to create system directory rpcgss May 15 00:58:18.820340 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.822045 kernel: Failed to create system directory rpcgss May 15 00:58:18.822074 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.824356 kernel: Failed to create system directory rpcgss May 15 00:58:18.824383 kernel: Failed to create system directory rpcgss May 15 00:58:18.824404 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.825895 kernel: Failed to create system directory rpcgss May 15 00:58:18.825914 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.827410 kernel: Failed to create system directory rpcgss May 15 00:58:18.827479 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.805000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:58:18.828902 kernel: Failed to create system directory rpcgss May 15 00:58:18.805000 audit[3548]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fac91ba7010 a1=70b64 a2=558b90a2a2b0 a3=5 items=0 ppid=9 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.805000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 00:58:18.841184 nfsidmap[3557]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 00:58:18.843631 nfsidmap[3560]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 00:58:18.854000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1262]: AVC avc: denied { watch_reads } for pid=1262 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1262]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed4c73d7e0 a2=10 a3=66fc74916fce2cf3 items=0 ppid=1 pid=1262 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.854000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 00:58:18.854000 audit[1262]: AVC avc: denied { watch_reads } for pid=1262 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1262]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed4c73d7e0 a2=10 a3=66fc74916fce2cf3 items=0 ppid=1 pid=1262 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.854000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 00:58:18.854000 audit[1262]: AVC avc: denied { watch_reads } for pid=1262 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 00:58:18.854000 audit[1262]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed4c73d7e0 a2=10 a3=66fc74916fce2cf3 items=0 ppid=1 pid=1262 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:18.854000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 00:58:18.993273 env[1195]: time="2025-05-15T00:58:18.993214032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c268485d-1968-4e88-bb98-d71affca8ca0,Namespace:default,Attempt:0,}" May 15 00:58:19.175970 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:58:19.176092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 00:58:19.175812 systemd-networkd[1017]: cali5ec59c6bf6e: Link UP May 15 00:58:19.176154 systemd-networkd[1017]: cali5ec59c6bf6e: Gained carrier May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.084 [INFO][3563] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.130-k8s-test--pod--1-eth0 default c268485d-1968-4e88-bb98-d71affca8ca0 1365 0 2025-05-15 00:58:02 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.130 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.084 [INFO][3563] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.108 [INFO][3578] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" HandleID="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Workload="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.115 [INFO][3578] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" HandleID="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Workload="10.0.0.130-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030b6e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.130", "pod":"test-pod-1", "timestamp":"2025-05-15 00:58:19.10682363 +0000 UTC"}, Hostname:"10.0.0.130", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.115 [INFO][3578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.116 [INFO][3578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.116 [INFO][3578] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.130' May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.117 [INFO][3578] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.120 [INFO][3578] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.123 [INFO][3578] ipam/ipam.go 489: Trying affinity for 192.168.2.64/26 host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.125 [INFO][3578] ipam/ipam.go 155: Attempting to load block cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.127 [INFO][3578] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.2.64/26 host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.127 [INFO][3578] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.2.64/26 handle="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.128 [INFO][3578] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4 May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.148 [INFO][3578] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.2.64/26 handle="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.170 [INFO][3578] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.2.68/26] block=192.168.2.64/26 handle="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.170 [INFO][3578] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.2.68/26] handle="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" host="10.0.0.130" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.170 [INFO][3578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.170 [INFO][3578] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.2.68/26] IPv6=[] ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" HandleID="k8s-pod-network.1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Workload="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.332227 env[1195]: 2025-05-15 00:58:19.171 [INFO][3563] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c268485d-1968-4e88-bb98-d71affca8ca0", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 58, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:58:19.333005 env[1195]: 2025-05-15 00:58:19.172 [INFO][3563] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.2.68/32] ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.333005 env[1195]: 2025-05-15 00:58:19.172 [INFO][3563] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.333005 env[1195]: 2025-05-15 00:58:19.176 [INFO][3563] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.333005 env[1195]: 2025-05-15 00:58:19.177 [INFO][3563] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.130-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c268485d-1968-4e88-bb98-d71affca8ca0", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 58, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.130", ContainerID:"1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.2.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"5e:7d:c6:1a:e2:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:58:19.333005 env[1195]: 2025-05-15 00:58:19.330 [INFO][3563] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.130-k8s-test--pod--1-eth0" May 15 00:58:19.543902 kubelet[1438]: E0515 00:58:19.543846 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:19.692000 audit[3601]: NETFILTER_CFG table=filter:100 family=2 entries=38 op=nft_register_chain pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:58:19.692000 audit[3601]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe5cef8560 a2=0 a3=7ffe5cef854c items=0 ppid=2638 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:58:19.705389 env[1195]: time="2025-05-15T00:58:19.705320605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:58:19.705389 env[1195]: time="2025-05-15T00:58:19.705364007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:58:19.705389 env[1195]: time="2025-05-15T00:58:19.705378183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:58:19.705642 env[1195]: time="2025-05-15T00:58:19.705565966Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4 pid=3609 runtime=io.containerd.runc.v2 May 15 00:58:19.719268 systemd[1]: run-containerd-runc-k8s.io-1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4-runc.ODmFZA.mount: Deactivated successfully. May 15 00:58:19.721945 systemd[1]: Started cri-containerd-1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4.scope. May 15 00:58:19.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.728000 audit: BPF prog-id=139 op=LOAD May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3609 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162323735663837613563653164623532656136323939353236386237 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3609 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162323735663837613563653164623532656136323939353236386237 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit: BPF prog-id=140 op=LOAD May 15 00:58:19.729000 audit[3618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098b70 items=0 ppid=3609 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162323735663837613563653164623532656136323939353236386237 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit: BPF prog-id=141 op=LOAD May 15 00:58:19.729000 audit[3618]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098bb8 items=0 ppid=3609 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162323735663837613563653164623532656136323939353236386237 May 15 00:58:19.729000 audit: BPF prog-id=141 op=UNLOAD May 15 00:58:19.729000 audit: BPF prog-id=140 op=UNLOAD May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { perfmon } for pid=3618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit[3618]: AVC avc: denied { bpf } for pid=3618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:19.729000 audit: BPF prog-id=142 op=LOAD May 15 00:58:19.729000 audit[3618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098fc8 items=0 ppid=3609 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:19.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162323735663837613563653164623532656136323939353236386237 May 15 00:58:19.731825 systemd-resolved[1136]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:58:19.751514 env[1195]: time="2025-05-15T00:58:19.751444220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c268485d-1968-4e88-bb98-d71affca8ca0,Namespace:default,Attempt:0,} returns sandbox id \"1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4\"" May 15 00:58:19.752796 env[1195]: time="2025-05-15T00:58:19.752754991Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 00:58:20.337975 env[1195]: time="2025-05-15T00:58:20.337907364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:20.339869 env[1195]: time="2025-05-15T00:58:20.339827017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:20.341719 env[1195]: time="2025-05-15T00:58:20.341682941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:20.343383 env[1195]: time="2025-05-15T00:58:20.343338278Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:58:20.343963 env[1195]: time="2025-05-15T00:58:20.343933896Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 00:58:20.346059 env[1195]: time="2025-05-15T00:58:20.346036161Z" level=info msg="CreateContainer within sandbox \"1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 00:58:20.361483 env[1195]: time="2025-05-15T00:58:20.361427411Z" level=info msg="CreateContainer within sandbox \"1b275f87a5ce1db52ea62995268b77823682b05cab49580ef3d0a613d682bec4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b1936b34211dc99a43d5c1c7357f766cfb8a7be0ff443c09634a4fe4c792fc85\"" May 15 00:58:20.362089 env[1195]: time="2025-05-15T00:58:20.362044940Z" level=info msg="StartContainer for \"b1936b34211dc99a43d5c1c7357f766cfb8a7be0ff443c09634a4fe4c792fc85\"" May 15 00:58:20.376253 systemd[1]: Started cri-containerd-b1936b34211dc99a43d5c1c7357f766cfb8a7be0ff443c09634a4fe4c792fc85.scope. May 15 00:58:20.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit: BPF prog-id=143 op=LOAD May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3609 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:20.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231393336623334323131646339396134336435633163373335376637 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3609 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:20.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231393336623334323131646339396134336435633163373335376637 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.386000 audit: BPF prog-id=144 op=LOAD May 15 00:58:20.386000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031c8a0 items=0 ppid=3609 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:20.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231393336623334323131646339396134336435633163373335376637 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit: BPF prog-id=145 op=LOAD May 15 00:58:20.387000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031c8e8 items=0 ppid=3609 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:20.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231393336623334323131646339396134336435633163373335376637 May 15 00:58:20.387000 audit: BPF prog-id=145 op=UNLOAD May 15 00:58:20.387000 audit: BPF prog-id=144 op=UNLOAD May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:58:20.387000 audit: BPF prog-id=146 op=LOAD May 15 00:58:20.387000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031ccf8 items=0 ppid=3609 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:20.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231393336623334323131646339396134336435633163373335376637 May 15 00:58:20.399696 env[1195]: time="2025-05-15T00:58:20.399513628Z" level=info msg="StartContainer for \"b1936b34211dc99a43d5c1c7357f766cfb8a7be0ff443c09634a4fe4c792fc85\" returns successfully" May 15 00:58:20.544289 kubelet[1438]: E0515 00:58:20.544225 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:20.708872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount784788552.mount: Deactivated successfully. May 15 00:58:21.117022 systemd-networkd[1017]: cali5ec59c6bf6e: Gained IPv6LL May 15 00:58:21.196481 kubelet[1438]: I0515 00:58:21.196422 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.603687797 podStartE2EDuration="19.196404749s" podCreationTimestamp="2025-05-15 00:58:02 +0000 UTC" firstStartedPulling="2025-05-15 00:58:19.752235025 +0000 UTC m=+88.857919506" lastFinishedPulling="2025-05-15 00:58:20.344951977 +0000 UTC m=+89.450636458" observedRunningTime="2025-05-15 00:58:21.196096168 +0000 UTC m=+90.301780649" watchObservedRunningTime="2025-05-15 00:58:21.196404749 +0000 UTC m=+90.302089230" May 15 00:58:21.544411 kubelet[1438]: E0515 00:58:21.544348 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:22.545432 kubelet[1438]: E0515 00:58:22.545373 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:23.545957 kubelet[1438]: E0515 00:58:23.545893 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 00:58:24.547069 kubelet[1438]: E0515 00:58:24.547012 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"